ID

VAR-200911-0398


CVE

CVE-2009-3555


TITLE

SSL and TLS protocols renegotiation vulnerability

Trust: 0.8

sources: CERT/CC: VU#120541

DESCRIPTION

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) The protocol includes renegotiation A vulnerability exists in the function. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Is a protocol that provides functions such as communication encryption and authentication. SSL and TLS The protocol includes renegotiation There are vulnerabilities due to functionality.A third party that can relay communication between the user and the server can insert arbitrary data at the beginning of the communication data under specific conditions. As a result, the attacker inserted HTTP The request may be sent to the server. Multiple vendors' TLS protocol implementations are prone to a security vulnerability related to the session-renegotiation process. Successful exploits of this issue may allow attackers to perform limited man-in-the-middle attacks against vulnerable applications. Note that this issue does not allow attackers to decrypt encrypted data. ---------------------------------------------------------------------- http://secunia.com/research/ http://secunia.com/company/jobs/open_positions/reverse_engineer ---------------------------------------------------------------------- TITLE: Oracle WebLogic Server OpenSSL Plaintext Injection Vulnerability SECUNIA ADVISORY ID: SA44292 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44292/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44292 RELEASE DATE: 2011-04-24 DISCUSS ADVISORY: http://secunia.com/advisories/44292/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44292/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44292 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Oracle has acknowledged a vulnerability in Weblogic Server, which can be exploited by malicious people to manipulate certain data. SOLUTION: Apply updates (please see the vendor's advisory for details). ORIGINAL ADVISORY: http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html#AppendixAS OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2011-0003 Synopsis: Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX Issue date: 2011-02-10 Updated on: 2011-02-10 (initial release of advisory) CVE numbers: --- Apache Tomcat --- CVE-2009-2693 CVE-2009-2901 CVE-2009-2902 CVE-2009-3548 CVE-2010-2227 CVE-2010-1157 --- Apache Tomcat Manager --- CVE-2010-2928 --- cURL --- CVE-2010-0734 --- COS Kernel --- CVE-2010-1084 CVE-2010-2066 CVE-2010-2070 CVE-2010-2226 CVE-2010-2248 CVE-2010-2521 CVE-2010-2524 CVE-2010-0008 CVE-2010-0415 CVE-2010-0437 CVE-2009-4308 CVE-2010-0003 CVE-2010-0007 CVE-2010-0307 CVE-2010-1086 CVE-2010-0410 CVE-2010-0730 CVE-2010-1085 CVE-2010-0291 CVE-2010-0622 CVE-2010-1087 CVE-2010-1173 CVE-2010-1437 CVE-2010-1088 CVE-2010-1187 CVE-2010-1436 CVE-2010-1641 CVE-2010-3081 --- Microsoft SQL Express --- CVE-2008-5416 CVE-2008-0085 CVE-2008-0086 CVE-2008-0107 CVE-2008-0106 --- OpenSSL --- CVE-2010-0740 CVE-2010-0433 CVE-2010-3864 CVE-2010-2939 --- Oracle (Sun) JRE --- CVE-2009-3555 CVE-2010-0082 CVE-2010-0084 CVE-2010-0085 CVE-2010-0087 CVE-2010-0088 CVE-2010-0089 CVE-2010-0090 CVE-2010-0091 CVE-2010-0092 CVE-2010-0093 CVE-2010-0094 CVE-2010-0095 CVE-2010-0837 CVE-2010-0838 CVE-2010-0839 CVE-2010-0840 CVE-2010-0841 CVE-2010-0842 CVE-2010-0843 CVE-2010-0844 CVE-2010-0845 CVE-2010-0846 CVE-2010-0847 CVE-2010-0848 CVE-2010-0849 CVE-2010-0850 CVE-2010-0886 CVE-2010-3556 CVE-2010-3566 CVE-2010-3567 CVE-2010-3550 CVE-2010-3561 CVE-2010-3573 CVE-2010-3565 CVE-2010-3568 CVE-2010-3569 CVE-2010-1321 CVE-2010-3548 CVE-2010-3551 CVE-2010-3562 CVE-2010-3571 CVE-2010-3554 CVE-2010-3559 CVE-2010-3572 CVE-2010-3553 CVE-2010-3549 CVE-2010-3557 CVE-2010-3541 CVE-2010-3574 --- pam_krb5 --- CVE-2008-3825 CVE-2009-1384 - ------------------------------------------------------------------------ 1. Summary Update 1 for vCenter Server 4.1, vCenter Update Manager 4.1, vSphere Hypervisor (ESXi) 4.1, ESXi 4.1, addresses several security issues. 2. Relevant releases vCenter Server 4.1 without Update 1, vCenter Update Manager 4.1 without Update 1, ESXi 4.1 without patch ESXi410-201101201-SG, ESX 4.1 without patch ESX410-201101201-SG. 3. Problem Description a. vCenter Server and vCenter Update Manager update Microsoft SQL Server 2005 Express Edition to Service Pack 3 Microsoft SQL Server 2005 Express Edition (SQL Express) distributed with vCenter Server 4.1 Update 1 and vCenter Update Manager 4.1 Update 1 is upgraded from SQL Express Service Pack 2 to SQL Express Service Pack 3, to address multiple security issues that exist in the earlier releases of Microsoft SQL Express. Customers using other database solutions need not update for these issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2008-5416, CVE-2008-0085, CVE-2008-0086, CVE-2008-0107 and CVE-2008-0106 to the issues addressed in MS SQL Express Service Pack 3. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter 4.1 Windows Update 1 vCenter 4.0 Windows affected, patch pending VirtualCenter 2.5 Windows affected, no patch planned Update Manager 4.1 Windows Update 1 Update Manager 4.0 Windows affected, patch pending Update Manager 1.0 Windows affected, no patch planned hosted * any any not affected ESXi any ESXi not affected ESX any ESX not affected * Hosted products are VMware Workstation, Player, ACE, Fusion. b. vCenter Apache Tomcat Management Application Credential Disclosure The Apache Tomcat Manager application configuration file contains logon credentials that can be read by unprivileged local users. The issue is resolved by removing the Manager application in vCenter 4.1 Update 1. If vCenter 4.1 is updated to vCenter 4.1 Update 1 the logon credentials are not present in the configuration file after the update. VMware would like to thank Claudio Criscione of Secure Networking for reporting this issue to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-2928 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter 4.1 Windows Update 1 vCenter 4.0 Windows not affected VirtualCenter 2.5 Windows not affected hosted * any any not affected ESXi any ESXi not affected ESX any ESX not affected * hosted products are VMware Workstation, Player, ACE, Fusion. c. vCenter Server and ESX, Oracle (Sun) JRE is updated to version 1.6.0_21 Oracle (Sun) JRE update to version 1.6.0_21, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Oracle (Sun) JRE 1.6.0_19: CVE-2009-3555, CVE-2010-0082, CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0845, CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849, CVE-2010-0850. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following name to the security issue fixed in Oracle (Sun) JRE 1.6.0_20: CVE-2010-0886. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter 4.1 Windows Update 1 vCenter 4.0 Windows not applicable ** VirtualCenter 2.5 Windows not applicable ** Update Manager 4.1 Windows not applicable ** Update Manager 4.0 Windows not applicable ** Update Manager 1.0 Windows not applicable ** hosted * any any not affected ESXi any ESXi not affected ESX 4.1 ESX ESX410-201101201-SG ESX 4.0 ESX not applicable ** ESX 3.5 ESX not applicable ** ESX 3.0.3 ESX not applicable ** * hosted products are VMware Workstation, Player, ACE, Fusion. ** this product uses the Oracle (Sun) JRE 1.5.0 family d. vCenter Update Manager Oracle (Sun) JRE is updated to version 1.5.0_26 Oracle (Sun) JRE update to version 1.5.0_26, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Oracle (Sun) JRE 1.5.0_26: CVE-2010-3556, CVE-2010-3566, CVE-2010-3567, CVE-2010-3550, CVE-2010-3561, CVE-2010-3573, CVE-2010-3565,CVE-2010-3568, CVE-2010-3569, CVE-2009-3555, CVE-2010-1321, CVE-2010-3548, CVE-2010-3551, CVE-2010-3562, CVE-2010-3571, CVE-2010-3554, CVE-2010-3559, CVE-2010-3572, CVE-2010-3553, CVE-2010-3549, CVE-2010-3557, CVE-2010-3541, CVE-2010-3574. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter 4.1 Windows not applicable ** vCenter 4.0 Windows affected, patch pending VirtualCenter 2.5 Windows affected, no patch planned Update Manager 4.1 Windows Update 1 Update Manager 4.0 Windows affected, patch pending Update Manager 1.0 Windows affected, no patch planned hosted * any any not affected ESXi any ESXi not affected ESX 4.1 ESX not applicable ** ESX 4.0 ESX affected, patch pending ESX 3.5 ESX affected, no patch planned ESX 3.0.3 ESX affected, no patch planned * hosted products are VMware Workstation, Player, ACE, Fusion. ** this product uses the Oracle (Sun) JRE 1.6.0 family e. vCenter Server and ESX Apache Tomcat updated to version 6.0.28 Apache Tomcat updated to version 6.0.28, which addresses multiple security issues that existed in earlier releases of Apache Tomcat The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Apache Tomcat 6.0.24: CVE-2009-2693, CVE-2009-2901, CVE-2009-2902,i and CVE-2009-3548. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Apache Tomcat 6.0.28: CVE-2010-2227, CVE-2010-1157. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter 4.1 Windows Update 1 vCenter 4.0 Windows affected, patch pending VirtualCenter 2.5 Windows not applicable ** hosted * any any not affected ESXi any ESXi not affected ESX 4.1 ESX ESX410-201101201-SG ESX 4.0 ESX affected, patch pending ESX 3.5 ESX not applicable ** ESX 3.0.3 ESX not applicable ** * hosted products are VMware Workstation, Player, ACE, Fusion. ** this product uses the Apache Tomcat 5.5 family f. vCenter Server third party component OpenSSL updated to version 0.9.8n The version of the OpenSSL library in vCenter Server is updated to 0.9.8n. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-0740 and CVE-2010-0433 to the issues addressed in this version of OpenSSL. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter 4.1 Windows Update 1 vCenter 4.0 Windows affected, patch pending VirtualCenter 2.5 Windows affected, no patch planned hosted * any any not applicable ESXi any ESXi not applicable ESX any ESX not applicable * hosted products are VMware Workstation, Player, ACE, Fusion. g. ESX third party component OpenSSL updated to version 0.9.8p The version of the ESX OpenSSL library is updated to 0.9.8p. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-3864 and CVE-2010-2939 to the issues addressed in this update. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter any Windows not applicable hosted * any any not applicable ESXi 4.1 ESXi ESXi410-201101201-SG ESXi 4.0 ESXi affected, patch pending ESXi 3.5 ESXi affected, patch pending ESX 4.1 ESX ESX410-201101201-SG ESX 4.0 ESX affected, patch pending ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX affected, patch pending * hosted products are VMware Workstation, Player, ACE, Fusion. h. ESXi third party component cURL updated The version of cURL library in ESXi is updated. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-0734 to the issues addressed in this update. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter any Windows not affected hosted * any any not affected ESXi 4.1 ESXi ESXi410-201101201-SG ESXi 4.0 ESXi affected, patch pending ESXi 3.5 ESXi affected, patch pending ESX any ESX not applicable * hosted products are VMware Workstation, Player, ACE, Fusion. i. ESX third party component pam_krb5 updated The version of pam_krb5 library is updated. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2008-3825 and CVE-2009-1384 to the issues addressed in the update. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter any Windows not affected hosted * any any not affected ESXi any ESXi not affected ESX 4.1 ESX ESX410-201101201-SG ESX 4.0 ESX not affected ESX 3.5 ESX not affected ESX 3.0.3 ESX not affected * hosted products are VMware Workstation, Player, ACE, Fusion. j. ESX third party update for Service Console kernel The Service Console kernel is updated to include kernel version 2.6.18-194.11.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-1084, CVE-2010-2066, CVE-2010-2070, CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, CVE-2010-2524, CVE-2010-0008, CVE-2010-0415, CVE-2010-0437, CVE-2009-4308, CVE-2010-0003, CVE-2010-0007, CVE-2010-0307, CVE-2010-1086, CVE-2010-0410, CVE-2010-0730, CVE-2010-1085, CVE-2010-0291, CVE-2010-0622, CVE-2010-1087, CVE-2010-1173, CVE-2010-1437, CVE-2010-1088, CVE-2010-1187, CVE-2010-1436, CVE-2010-1641, and CVE-2010-3081 to the issues addressed in the update. Note: This update also addresses the 64-bit compatibility mode stack pointer underflow issue identified by CVE-2010-3081. This issue was patched in an ESX 4.1 patch prior to the release of ESX 4.1 Update 1. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter any Windows not affected hosted * any any not affected ESXi any ESXi not affected ESX 4.1 ESX ESX410-201101201-SG ESX 4.0 ESX affected, patch pending ESX 3.5 ESX not applicable ESX 3.0.3 ESX not applicable * hosted products are VMware Workstation, Player, ACE, Fusion. 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware vCenter Server 4.1 Update 1 and modules ---------------------------------------------- http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0 Release Notes: http://downloads.vmware.com/support/pubs/vs_pages/vsp_pubs_esx41_vc41.html File type: .iso md5sum: 729cf247aa5d33ceec431c86377eee1a sha1sum: c1e10a5fcbc1ae9d13348d43541d574c563d66f0 File type: .zip md5sum: fd1441bef48a153f2807f6823790e2f0 sha1sum: 31737a816ed1c08ab3a505fb6db2483f49ad7c19 VMware vSphere Client File type: .exe md5sum: cb6aa91ada1289575355d79e8c2a9f8e sha1sum: f9e3d8eb83196ae7c31aab554e344a46b722b1e4 ESXi 4.1 Installable Update 1 ----------------------------- http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0 Release Notes: http://downloads.vmware.com/support/vsphere4/doc/vsp_esxi41_u1_rel_notes.html http://kb.vmware.com/kb/1027919 File type: .iso MD5SUM: d68d6c2e040a87cd04cd18c04c22c998 SHA1SUM: bbaacc0d34503822c14f6ccfefb6a5b62d18ae64 ESXi 4.1 Update 1 (upgrade ZIP from ESXi 4.1) File type: .zip MD5SUM: 2f1e009c046b20042fae3b7ca42a840f SHA1SUM: 1c9c644012dec657a705ddd3d033cbfb87a1fab1 ESXi 4.1 Update 1 (upgrade ZIP from ESXi 4.0) File type: .zip MD5SUM: 67b924618d196dafaf268a7691bd1a0f SHA1SUM: 9d74b639e703259d9e49c0341158e0d4e45de516 ESXi 4.1 Update 1 (upgrade ZIP from ESXi 3.5) File type: .zip MD5SUM: a6024b9f6c6b7b2c629696afc6d07cf4 SHA1SUM: b3841de1a30617ac68d5a861882aa72de3a93488 VMware Tools CD image for Linux Guest OSes File type: .iso MD5SUM: dad66fa8ece1dd121c302f45444daa70 SHA1SUM: 56535a2cfa7799607356c6fd0a7d9f041da614af VMware vSphere Client File type: .exe MD5SUM: cb6aa91ada1289575355d79e8c2a9f8e SHA1SUM: f9e3d8eb83196ae7c31aab554e344a46b722b1e4 ESXi Installable Update 1 contains the following security bulletins: ESXi410-201101201-SG. ESX 4.1 Update 1 ---------------- http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0 Release Notes: http://downloads.vmware.com/support/vsphere4/doc/vsp_esx41_u1_rel_notes.html http://kb.vmware.com/kb/1029353 ESX 4.1 Update 1 (DVD ISO) File type: .iso md5sum: b9a275b419a20c7bedf31c0bf64f504e sha1sum: 2d85edcaca8218013585e1eab00bc80db6d96e11 ESX 4.1 Update 1 (upgrade ZIP from ESX 4.1) File type: .zip md5sum: 2d81a87e994aa2b329036f11d90b4c14 sha1sum: c2bfc0cf7ac03d24afd5049ddbd09a865aad1798 Pre-upgrade package for ESX 4.0 to ESX 4.1 Update 1 File type: .zip md5sum: 75f8cebfd55d8a81deb57c27def963c2 sha1sum: 889c15aa8008fe0e29439d0ab3468c2beb1c4fe2 ESX 4.1 Update 1 (upgrade ZIP from ESX 4.0) File type: .zip md5sum: 1dc9035cd10e7e60d27e7a7aef57b4c2 sha1sum: e6d3fb65d83a3e263d0f634a3572025854ff8922 VMware Tools CD image for Linux Guest OSes File type: .iso md5sum: dad66fa8ece1dd121c302f45444daa70 sha1sum: 56535a2cfa7799607356c6fd0a7d9f041da614af VMware vSphere Client File type: .exe md5sum: cb6aa91ada1289575355d79e8c2a9f8e sha1sum: f9e3d8eb83196ae7c31aab554e344a46b722b1e4 ESX410-Update01 contains the following security bulletins: ESX410-201101201-SG (COS kernel, pam_krb5, cURL, OpenSSL, Apache Tomcat, Oracle (Sun) JRE) | http://kb.vmware.com/kb/1027904 ESX410-201101226-SG (glibc) | http://kb.vmware.com/kb/1031330 ESX410-Update01 also contains the following non-security bulletins ESX410-201101211-UG, ESX410-201101213-UG, ESX410-201101215-UG, ESX410-201101202-UG, ESX410-201101203-UG, ESX410-201101204-UG, ESX410-201101206-UG, ESX410-201101207-UG, ESX410-201101208-UG, ESX410-201101214-UG, ESX410-201101216-UG, ESX410-201101217-UG, ESX410-201101218-UG, ESX410-201101219-UG, ESX410-201101220-UG, ESX410-201101221-UG, ESX410-201101222-UG, ESX410-201101225-UG. To install an individual bulletin use esxupdate with the -b option. 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5416 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0086 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0107 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0106 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2928 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0433 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1084 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2070 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2248 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2524 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0008 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0437 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4308 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0003 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1086 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0410 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0730 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0291 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1087 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1173 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574 - ------------------------------------------------------------------------ 6. Change log 2011-02-10 VMSA-2011-0003 Initial security advisory in conjunction with the release of vCenter Server 4.1 Update 1, vCenter Update Manager 4.1 Update 1, ESXi 4.1 Update 1, and ESX 4.1 Update 1 on 2011-02-10. - ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2011 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iEYEARECAAYFAk1U1eoACgkQS2KysvBH1xm3swCfeh4sWvPOubDT1K7QlRj3SjW9 dxYAmwbNLMR9IG/rKZDYh9hqcf4IldCX =2pVj -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . =========================================================== Ubuntu Security Notice USN-990-2 September 21, 2010 apache2 vulnerability CVE-2009-3555 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 9.04 Ubuntu 9.10 Ubuntu 10.04 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: apache2-common 2.0.55-4ubuntu2.11 Ubuntu 8.04 LTS: apache2.2-common 2.2.8-1ubuntu0.18 Ubuntu 9.04: apache2.2-common 2.2.11-2ubuntu2.7 Ubuntu 9.10: apache2.2-common 2.2.12-1ubuntu2.3 Ubuntu 10.04 LTS: apache2.2-common 2.2.14-5ubuntu8.2 In general, a standard system update will make all the necessary changes. Details follow: USN-860-1 introduced a partial workaround to Apache that disabled client initiated TLS renegotiation in order to mitigate CVE-2009-3555. USN-990-1 introduced the new RFC5746 renegotiation extension in openssl, and completely resolves the issue. After updating openssl, an Apache server will allow both patched and unpatched web browsers to connect, but unpatched browsers will not be able to renegotiate. This update introduces the new SSLInsecureRenegotiation directive for Apache that may be used to re-enable insecure renegotiations with unpatched web browsers. For more information, please refer to: http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslinsecurerenegotiation Original advisory details: Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols. This update adds backported support for the new RFC5746 renegotiation extension and will use it when both the client and the server support it. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11.diff.gz Size/MD5: 134052 86e4030d5d0a07c722a2af51df291a19 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11.dsc Size/MD5: 1183 99ab703a9b5635ad8e1d9557b9fe5e4e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz Size/MD5: 6092031 45e32c9432a8e3cf4227f5af91b03622 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.11_all.deb Size/MD5: 2126176 65b28d275c8e70558d8ed77bfcef265e amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 834986 610535f67dc77d446423e9cc2408d21e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 229802 14ea62918280ce5f464ecedab9bd79b0 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 224906 1578725d767b5fe9cb6b45ca41d1292e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 229384 b8f6d54777dbc86b2a5d6c4d2d7cc573 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 173130 def232883ce71e08f0e2b11cfd27f5b7 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 173912 08da2084c359fc7b2968432f41234e23 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 95722 94484f5bfd67cc83086f7a921a77caed http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 37768 f486d5e84b1907123c60d572aa7e90f2 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 287306 7a907e49b019763f8149a3beb203876c http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_amd64.deb Size/MD5: 145894 88fbebdffeb19fdbe81fe570166d73a1 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 788252 8d2b5d1f24c13e241d56fbd1ae81ff81 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 204368 327dbcf36dc28bc9135c108237b1f502 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 200298 58c12fa82ecf7447d77834d56f917ef3 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 203844 d6f74b3551fe34434b81e26a149e4ae0 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 173156 ccb5791809b19033688165a9ef0d81e6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 173924 999e1a48fdfbaf16f7bdb2d29d0ea0fc http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 93640 2b3d1a6cddfaec3349b72efb5504166f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 37762 898b5d95105c199416a75cd3146c6c1b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 263308 42f340586a0360a8d923231644090cdf http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_i386.deb Size/MD5: 133780 fba34593386d78231b33824f328f5654 powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 861116 6a6d5d616a52c907ba9203ce711355aa http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 221784 297764dcac720f85348c85c2ef32a0d2 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 217424 9afb62c85bcaad3db853bb7b7ebee607 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 221254 9f05d5933ee0236f431a226842bf86c0 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 173152 187839a4b4347c81fe5c630be07f0b3b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 173928 98b0f235f0469e5319728049367ba8a4 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 105440 d6544dafd34838af96690f14c540fde3 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 37770 e91ef9ad15dc3dd59d251cad5ee5ef13 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 282892 13408f668b7993a6f4ec723f8cdd6bbb http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_powerpc.deb Size/MD5: 142978 e25da876441b97ac3da8272b3d49d381 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 805832 04e58a008ae3f3675a325ee2932bb253 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 211912 15498a7c53b8f260dc4bb6a86bfe3d53 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 207632 c0daf011cf3fada9c222142c6ffcd044 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 211300 b06bb4a8f7f16378de0a21b368d3d622 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 173168 ee6150a2e2c4a8221ee89c31e6177522 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 173944 858f3c03cfdb0cb4ec0611ee8542671f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 94782 743ee202b5c0bebf4bdc459313552d81 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 37770 802c97dff1bff907d5794b256add1e6b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 269346 24c0a57f4ad915ea8f6e094f243a9506 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_sparc.deb Size/MD5: 131734 194d74424d27b2997c1ec72257f573c1 Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.18.diff.gz Size/MD5: 146865 97f3b7079faf574f890681db77c762f2 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.18.dsc Size/MD5: 1406 399d2b9f9909282c486655549dc0d52b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz Size/MD5: 6125771 39a755eb0f584c279336387b321e3dfc Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.18_all.deb Size/MD5: 1929538 14e05937748058927c2037df3eb502c7 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.18_all.deb Size/MD5: 73466 6ca3b132a45f4ce59171ab7f186594df http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.18_all.deb Size/MD5: 6261582 4f1116c99f0f65ce4997a28085fa7431 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.18_all.deb Size/MD5: 46348 98166d89408a56e09ebd4a83b83ed79c amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_amd64.deb Size/MD5: 253644 23f9caddb5ffe5026a558b8d572967ef http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_amd64.deb Size/MD5: 249242 953b054df0e4dab7264eba0bd6007b59 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_amd64.deb Size/MD5: 253048 3f4d54d5a32c915f3f151b51bae01c13 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_amd64.deb Size/MD5: 206156 901fcdafafdb3480cf1fab5cf73af73b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_amd64.deb Size/MD5: 206922 6a86fc862877947519ae0fe215841385 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_amd64.deb Size/MD5: 142242 f0b1891fc7b07c8235a40e2df3fbabb0 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_amd64.deb Size/MD5: 804806 52c57c3584842ef918c0f37c2ce6d736 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_i386.deb Size/MD5: 236606 c547fb8c061846b2f755704787448747 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_i386.deb Size/MD5: 232128 6fc2670a98d40c1bfa90991186228811 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_i386.deb Size/MD5: 235858 32e129c73e49a2e39844645dd50d04f5 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_i386.deb Size/MD5: 206142 cdd55808ce850d9d0ec223ed092fe426 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_i386.deb Size/MD5: 206910 b736a272e10fe68cb64946b508efd74c http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_i386.deb Size/MD5: 141202 4254d6b5ead42cedd02320bf6ddb2876 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_i386.deb Size/MD5: 756332 5bd40900c8939b451e8fcbed2da263f1 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_lpia.deb Size/MD5: 236164 9272f138e98d34b0d4019a0830e79b36 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_lpia.deb Size/MD5: 231778 1e5f9950471fd4f778ff271d8488b60a http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_lpia.deb Size/MD5: 235304 e8eddedf92d24b378f38bf61fa0f2cd6 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_lpia.deb Size/MD5: 206156 467bcd1937490b798b49630c65551e60 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_lpia.deb Size/MD5: 206926 75b6f2f47aed68fc703918b00e04f482 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_lpia.deb Size/MD5: 141778 fd353dd7829e5876517339676b1ee873 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_lpia.deb Size/MD5: 750676 598bc9e3e5a1b7938b4ad34e4cc04c67 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_powerpc.deb Size/MD5: 254686 29d669072dca90bbdcf11439614ee23c http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_powerpc.deb Size/MD5: 250142 643655823b5fbd3ec33b50d7a30334cf http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_powerpc.deb Size/MD5: 254248 a6afd90ee57a63e87867fe1dfb1a9cb0 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_powerpc.deb Size/MD5: 206156 552e1373699931b091adfa28bfb3a193 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_powerpc.deb Size/MD5: 206928 eedb87366079396813a5058dd19e3a88 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_powerpc.deb Size/MD5: 158934 95c4cdcc76c0300cf6e9585b5a64b167 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_powerpc.deb Size/MD5: 907014 c64dae2099b5120197a8ffa7d4d41dc4 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_sparc.deb Size/MD5: 237956 525845937495f123e08dff554fa599af http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_sparc.deb Size/MD5: 233702 13eb704a427e3dc2eea16c6831ee4c32 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_sparc.deb Size/MD5: 237124 22a389d42cd3512386780cf6bb87f8dc http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_sparc.deb Size/MD5: 206150 1cb75e631967a8edbf17c8959e8faf37 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_sparc.deb Size/MD5: 206920 731f15c841b3f979146c59968cea0267 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_sparc.deb Size/MD5: 144372 930e3abcb2ca207b0a801d1e7b2c9053 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_sparc.deb Size/MD5: 766240 3cedd97a31291d23dd464bf501363af3 Updated packages for Ubuntu 9.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.7.diff.gz Size/MD5: 145104 db565a9a5297a1a306fd7a45932d702b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.7.dsc Size/MD5: 1820 1cd768993ff45ac014733aa7cf95155c http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz Size/MD5: 6806786 03e0a99a5de0f3f568a0087fb9993af9 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.7_all.deb Size/MD5: 2219258 b055c44bbf2e035fcaf126abd0b76fb2 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.7_all.deb Size/MD5: 46916 cfc7b7ee2b9679700967d6228a9568c9 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.7_all.deb Size/MD5: 6948950 e239e56fdd85126bcdd69e85b950f051 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 259324 1d0e10d402f67ca36a54c1c911a69006 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 253506 a7c00fd853a29cf74da6ac9a5e9da3c3 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 258706 91a66a6fadfb7d2c295a6e70ac5d03de http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 213586 33e272b7355cca5159964c8b71155ad1 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 214554 8bca44b947f2323b6b94382d846a4abb http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 151436 6a5b923eba61bfb2797396f10938b16c http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 827658 654f756c26233a94727f95df91280ca7 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 88100 f7db8d90f3178aaaf9783ab0867dfe1a http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_amd64.deb Size/MD5: 86432 220d6470ff6c1d03e35c260b34246742 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 245792 8a841b19de4b298d41298b581ef94738 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 240344 17444c867fa3acb12e3468c1c34c01ba http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 245228 df223029f06daab11c4d58c6f540ef1f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 213602 0f9f83fabfb1b3f63e23c8ae0adb12cc http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 214570 9ca8a8f9b8169ad9ec352d66e757a046 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 150344 4f5c23369c9c3e1ba13ddc5692916c38 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 784886 ba51bfa801be73a09b02dcb3cab26241 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 87466 cd964b4442e0dcbba54f9a0b7ec6fc3d http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_i386.deb Size/MD5: 85878 f77caa709cd21efa2a85e86ef9ff81cc lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 242698 df55b4d55e2b301f44d090028f15cb98 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 237198 8da840e3c848a331577fa9d833842c87 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 242086 bd2880092939682f4dc22c1c6671176c http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 213600 795a7ae2ee3105f40bbc195f320a0fbf http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 214572 b778126593e0fed9c83e706c1a09f39b http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 150058 bf29eee7c1d54eb1ead38b804731e1b9 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 774190 89770cf91ed09e402b56e5498f48c81c http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 87416 fd45b5d764c395837ed9a3b0e58f0ecb http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_lpia.deb Size/MD5: 85836 86b01255d8a633d59192a9feb559e158 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 265780 f114a597519a9d572cffa39296237bc2 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 260776 a693ebd72a026871338e3aa8b6a527c2 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 265424 b26fa086b61080cfffb6366953c6fb0b http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 213602 e0ded14891fd23424f31960d93eb8ee0 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 214574 a91ec98b251e1cbdda5bc9b172b9fc17 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 164756 7319d899ce6d4531c9500204897f50ec http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 933132 6b43c787eca540a18f3fb94d577d76cd http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 88158 6468347a2c09d7a27575dc2b485389b7 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_powerpc.deb Size/MD5: 86436 d6d6390d7efa2710bcc4b65c34737d03 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 251090 6df99897e7db3d6eb31ea0ade1cbdaea http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 245394 88215d008af2f6f3695b7f8a73dceee6 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 250408 7d4e6592d08cce5d58929990ef2f7dc7 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 213604 34163cecc4945e43096956cec44d3e26 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 214570 d53eb43ac5fd6ed8fe742ee1a15ca8d9 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 154594 0839be06a5fbe741ca3cc1240dcfe4f8 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 789836 f718d0c11c7e4df0515d9481fe4be506 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 87662 6fb7b012347fb516d184559fc8d240b2 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_sparc.deb Size/MD5: 86024 0877fc6ca6c05a447beadabe047f29d1 Updated packages for Ubuntu 9.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.3.diff.gz Size/MD5: 188060 850605ce03d4489659ce1cb2cc0abc68 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.3.dsc Size/MD5: 1913 8d36ecddde480b75fb16706fe82990e1 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12.orig.tar.gz Size/MD5: 6678149 17f017b571f88aa60abebfe2945d7caf Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.12-1ubuntu2.3_all.deb Size/MD5: 2247010 5fa9130715ede82d32f3e8a348604075 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.12-1ubuntu2.3_all.deb Size/MD5: 2348 9674046be587c64c4556f48a90ecaea6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.12-1ubuntu2.3_all.deb Size/MD5: 2382 b695def67e1cbbbfe1fd33fa97c96345 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.12-1ubuntu2.3_all.deb Size/MD5: 2320 4645c0748419a66f1b5721be7d2b3197 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.12-1ubuntu2.3_all.deb Size/MD5: 285380 23896ffd82544ffcdddef03d093018e3 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.3_all.deb Size/MD5: 1428 89f8b2b78403e63cb95bb3822f668338 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.12-1ubuntu2.3_all.deb Size/MD5: 2378 a80e5beda7d56dc0d930cd5f995e2eba amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_amd64.deb Size/MD5: 137078 53d4aec4b09109faa3f70a08dcfcefaf http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_amd64.deb Size/MD5: 138180 9f3b6db71330a8283174ed08351113d8 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_amd64.deb Size/MD5: 156942 4f09279ba2394c9d0b6457d86b03e3d7 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_amd64.deb Size/MD5: 1400178 676c22d2d96b9bdba3b87f7d48864180 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_amd64.deb Size/MD5: 92792 fb350714ee3bdc6234dc486b218ab75a http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_amd64.deb Size/MD5: 91166 2f9bf5279b4014e327a969c935fabe0e i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_i386.deb Size/MD5: 137102 77dba9a047e7bfc795658fbdf1f373b9 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_i386.deb Size/MD5: 138200 f99471e2347213e15794c3c3cddc2a18 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_i386.deb Size/MD5: 155488 6ee483e52e9e556effd84bf7b41640a7 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_i386.deb Size/MD5: 1309694 f92e2be5d56ae59bfe26f20fd6f7ecc2 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_i386.deb Size/MD5: 92182 75bbbffacaa541e0046bca6233c1c88e http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_i386.deb Size/MD5: 90612 3ed6196a120c65f6c8438914bce3f9af lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_lpia.deb Size/MD5: 137100 621e4aa3e57d81b016ea76347fa4ed86 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_lpia.deb Size/MD5: 138202 e36e6db5508c8134d9e6999e5d80fb8d http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_lpia.deb Size/MD5: 155398 cbad72b7d930b21255392bb549f03737 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_lpia.deb Size/MD5: 1291102 f940d7c307e24e8d28eedf954838dafd http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_lpia.deb Size/MD5: 92132 9e7c2ede66e695ab1362512a3c1ee827 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_lpia.deb Size/MD5: 90614 98e1b90804cbd553dd201ad28f329430 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_powerpc.deb Size/MD5: 137106 bd359b9a9363a81aa98655c43f1478b4 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_powerpc.deb Size/MD5: 138206 c798a77072e6634e462f1cdf3dd8b43f http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_powerpc.deb Size/MD5: 161340 875392a41fe389a1fc7eb3219de8994c http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_powerpc.deb Size/MD5: 1390682 6dee1cd49ea2fd42792adbf7d4ca1429 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_powerpc.deb Size/MD5: 92702 35649519a902f404ce2177d4d6a39256 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_powerpc.deb Size/MD5: 91068 27a790c732e9972a9ddb38efd8382be2 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_sparc.deb Size/MD5: 137104 cacf001abead60f0bf6bb5b4bc4ae3f8 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_sparc.deb Size/MD5: 138202 8c2c89d48728544e02d1d8c9b8c151bd http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_sparc.deb Size/MD5: 159784 210a6ab1994c1cd33ef3faba4ba1ef6d http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_sparc.deb Size/MD5: 1298528 307f7a890def6607c771ed81e97d6786 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_sparc.deb Size/MD5: 92470 99b248317f322925fa0177f1cab30193 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_sparc.deb Size/MD5: 90846 855bfc344be95c2e2518eeb24ac26bd1 Updated packages for Ubuntu 10.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2.diff.gz Size/MD5: 212134 3c177f451934f9cd6654a017f7131c9b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2.dsc Size/MD5: 2057 7372de2308c11c5449ff2fa531635871 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14.orig.tar.gz Size/MD5: 6684081 2c1e3c7ba00bcaa0163da7b3e66aaa1e Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.14-5ubuntu8.2_all.deb Size/MD5: 2257438 068a77e3441fdceedc1afc267011bf38 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 2400 48e38cc487c5abcb64a529bbe1d47971 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 2426 7f880b5588cdd0adea12a3649612d740 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 2374 175d74a10131457005ff635f4ba49c97 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 136260 d2318afcb9b2bfd26e46f4895f1fbd37 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 137306 3347faad5f0a2f781480a555a25c9a59 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 160896 8b101bf3b78dc9f16402cdbc65e5355f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 2730164 f6f41d6e25d315dc97451b39e3a309c4 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 289774 245583d23128c0f6be0343146b38b72e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 1486 0c652fcedc25c59e48faec9fa5da816d http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 2424 a8dfc23cc147f5d5c982309ee0665239 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 96688 908d970263346097de7a052296fa6be9 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_amd64.deb Size/MD5: 95018 ff323d16c8ecc35474d1476aeece0147 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 2392 14bab2ebfb53ff37da5286ebbf79c8df http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 2428 63d0e6069f2009c0e0a8170a6e6318f6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 2366 a7c91b2d9f5700e116412c496431d2a5 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 136274 2785281078d3555724603ec98ffdce86 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 137318 539ad22318c9bfcebd764fef065a166f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 159454 c4c67485f2750a64c846f6f07f8b51bb http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 2622180 26fdf112437b13660e13b973ee522916 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 289774 94cd4b22df3c5beb27c1c3ced19d732f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 1484 9d28b322928df90cd85c5b93757e2381 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 2424 420faa39ba08d84f74c9599592904392 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 96034 c525bf0f0dfb891246f63a4b900516be http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_i386.deb Size/MD5: 94468 c7cd6dbb03a2da94126bdc010a2e0954 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 2402 b4022c68a3d5aaba548fbe82648676aa http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 2434 989498ce049fcb82338b5661786f23d6 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 2380 4fa9d61c25a2161136c657ba7ea11666 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 136292 b44ed701f61489c7959058d1ab3080e5 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 137332 91c2a8a81435dad521f76208a06f6f0b http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 165752 ac0f1989749c0664c15474c2473d3f11 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 2765172 632b25fab8e3a964479a1d65904f085f http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 289808 9043e5ac2d9b48f162b101b06f7cdf0b http://ports.ubuntu.com/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 1492 d8eec2abe88d0fd1c29bb939f424a769 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 2428 a3b8ca7cdd7be3b81a1220f8b107f2a7 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 96602 703947ce7bd754a87aab78f781c09790 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_powerpc.deb Size/MD5: 94926 6f016d6173305612ab55d75ac5250e21 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 2398 2730e4118d859da0779dba18084eaf30 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 2430 44b38809d4053bcc55f50f6c7cfa4b3c http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 2372 a64eeee425b210106132ce4172bfb4a4 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 136272 a8ce66227998b82d2b65df7159101a69 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 137314 6ae029f5d69711cf89a1caf8baaa1400 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 165720 64ad47568add781287d794c19b74967b http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 2592876 3371ba1ea3f326e735cf53248ffb7615 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 289788 e7e4c6c55df10cf3f9619165c85e03a9 http://ports.ubuntu.com/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 1488 91a5fac3d7ccb535511858a779d099da http://ports.ubuntu.com/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 2428 2f4cd99d96b0836f2c041ebad923a17b http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 96498 2f7699f18e857a05ec9ea74ff2b34518 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_sparc.deb Size/MD5: 94808 6bc31ebfb5185b93f5cac6f089e745ff . Note that this security issue does not really apply as zlib compression is not enabled in the openssl build provided by Mandriva, but apache is patched to address this issue anyway (conserns 2008.1 only). Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via wildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this security issue was initially addressed with MDVSA-2008:195 but the patch fixing the issue was added but not applied in 2009.0. The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file (CVE-2009-1195). The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests (CVE-2009-1890). Fix a potential Denial-of-Service attack against mod_deflate or other modules, by forcing the server to consume CPU time in compressing a large file after a client disconnects (CVE-2009-1891). NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes (CVE-2009-3095). Apache is affected by SSL injection or man-in-the-middle attacks due to a design flaw in the SSL and/or TLS protocols. A short term solution was released Sat Nov 07 2009 by the ASF team to mitigate these problems. Apache will now reject in-session renegotiation (CVE-2009-3555). This update provides a solution to these vulnerabilities. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: dd2bebdd6726d2d865331d37068a90b7 2008.0/i586/apache-base-2.2.6-8.3mdv2008.0.i586.rpm 6de9d36a91b125cc03bafe911b7a38a2 2008.0/i586/apache-devel-2.2.6-8.3mdv2008.0.i586.rpm ab7963efad1b7951c94a24075a2070e7 2008.0/i586/apache-htcacheclean-2.2.6-8.3mdv2008.0.i586.rpm 42a53b597d5547fb88b7427cacd617a1 2008.0/i586/apache-mod_authn_dbd-2.2.6-8.3mdv2008.0.i586.rpm 1dff9d313e93c94e907d8c72348ed2e0 2008.0/i586/apache-mod_cache-2.2.6-8.3mdv2008.0.i586.rpm b575ede2978ad47e41d355bd8b192725 2008.0/i586/apache-mod_dav-2.2.6-8.3mdv2008.0.i586.rpm 8ff3dee24d2d2d9a8d13e567cf1eaced 2008.0/i586/apache-mod_dbd-2.2.6-8.3mdv2008.0.i586.rpm 7bae541dfec14b21700878514750de83 2008.0/i586/apache-mod_deflate-2.2.6-8.3mdv2008.0.i586.rpm 19cab766a26ce53bd7e7973ed92f0db4 2008.0/i586/apache-mod_disk_cache-2.2.6-8.3mdv2008.0.i586.rpm a1336e4ab4f282c388d7565bde4557fd 2008.0/i586/apache-mod_file_cache-2.2.6-8.3mdv2008.0.i586.rpm 6b2f2eb949977349390fa3b06cf257e7 2008.0/i586/apache-mod_ldap-2.2.6-8.3mdv2008.0.i586.rpm 3640bbef5262ec0407126e31dd5ddde3 2008.0/i586/apache-mod_mem_cache-2.2.6-8.3mdv2008.0.i586.rpm 98793747365606baabc08f22e36a0a04 2008.0/i586/apache-mod_proxy-2.2.6-8.3mdv2008.0.i586.rpm d7fe4d88f25d2a01b0809ab5292b0999 2008.0/i586/apache-mod_proxy_ajp-2.2.6-8.3mdv2008.0.i586.rpm 4c9f48adbd0b1d45a874f06b9275ebe3 2008.0/i586/apache-mod_ssl-2.2.6-8.3mdv2008.0.i586.rpm e5a1d9476316ccc9f183cb1ae5bbcf31 2008.0/i586/apache-modules-2.2.6-8.3mdv2008.0.i586.rpm 44f7810695a40519c68930695829f124 2008.0/i586/apache-mod_userdir-2.2.6-8.3mdv2008.0.i586.rpm d6f666e9954422664d1f029fc147b591 2008.0/i586/apache-mpm-event-2.2.6-8.3mdv2008.0.i586.rpm 75e205ddbc9313b8d02519e57919923a 2008.0/i586/apache-mpm-itk-2.2.6-8.3mdv2008.0.i586.rpm 6d68e8fa7baccc2ad090c703fb33458e 2008.0/i586/apache-mpm-prefork-2.2.6-8.3mdv2008.0.i586.rpm 331f18ce48403472fc7f8af6d5daee8e 2008.0/i586/apache-mpm-worker-2.2.6-8.3mdv2008.0.i586.rpm c75e69bcabc104938cb9033e591d1de8 2008.0/i586/apache-source-2.2.6-8.3mdv2008.0.i586.rpm 23fcdf29e21b0146fb5646baca2fa63b 2008.0/SRPMS/apache-2.2.6-8.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 3d4afe3f8da8369d80b6c195e132c5c0 2008.0/x86_64/apache-base-2.2.6-8.3mdv2008.0.x86_64.rpm 37034ee7c7eb813de2a00a6945a10248 2008.0/x86_64/apache-devel-2.2.6-8.3mdv2008.0.x86_64.rpm ba296f9aa229a616a2c406d1a16912c3 2008.0/x86_64/apache-htcacheclean-2.2.6-8.3mdv2008.0.x86_64.rpm 77fa75d36e7a4bbe154c846e3271e7a3 2008.0/x86_64/apache-mod_authn_dbd-2.2.6-8.3mdv2008.0.x86_64.rpm ca29e2db08b29e319f2392b46ea4c3fe 2008.0/x86_64/apache-mod_cache-2.2.6-8.3mdv2008.0.x86_64.rpm 3fbf5a0276adaa2d887a92482d81313f 2008.0/x86_64/apache-mod_dav-2.2.6-8.3mdv2008.0.x86_64.rpm 9c66e471c2d2d3e43462302d0cc6f1c9 2008.0/x86_64/apache-mod_dbd-2.2.6-8.3mdv2008.0.x86_64.rpm 05020102a26a28b96319b23e3b6e43d6 2008.0/x86_64/apache-mod_deflate-2.2.6-8.3mdv2008.0.x86_64.rpm 7191542417b30ed77334f1b8366628aa 2008.0/x86_64/apache-mod_disk_cache-2.2.6-8.3mdv2008.0.x86_64.rpm f4177dbdcfd2e3dc8e66be731ad731c4 2008.0/x86_64/apache-mod_file_cache-2.2.6-8.3mdv2008.0.x86_64.rpm fea417664f0a2689fa12308bd80c2fe4 2008.0/x86_64/apache-mod_ldap-2.2.6-8.3mdv2008.0.x86_64.rpm 9cf956fa426e6bdf6497337b6e26a2ab 2008.0/x86_64/apache-mod_mem_cache-2.2.6-8.3mdv2008.0.x86_64.rpm 0d9d04ca878bb3f19f4764152da42d82 2008.0/x86_64/apache-mod_proxy-2.2.6-8.3mdv2008.0.x86_64.rpm dbbcd75dd83779f54f98fa3e16b59f13 2008.0/x86_64/apache-mod_proxy_ajp-2.2.6-8.3mdv2008.0.x86_64.rpm dce8db6742ba28a71e18b86bb38688c8 2008.0/x86_64/apache-mod_ssl-2.2.6-8.3mdv2008.0.x86_64.rpm 2ff69d6e9c2cd3250f6746d4a7d921fd 2008.0/x86_64/apache-modules-2.2.6-8.3mdv2008.0.x86_64.rpm f298827d4dfa631a77907f7f5733fa29 2008.0/x86_64/apache-mod_userdir-2.2.6-8.3mdv2008.0.x86_64.rpm 6f02fb080e308ca0826fdb1ef00a1489 2008.0/x86_64/apache-mpm-event-2.2.6-8.3mdv2008.0.x86_64.rpm b886d30d73c60a515b3ed36d7f186378 2008.0/x86_64/apache-mpm-itk-2.2.6-8.3mdv2008.0.x86_64.rpm 62d7754a5aa7af596cc06cd540d4025f 2008.0/x86_64/apache-mpm-prefork-2.2.6-8.3mdv2008.0.x86_64.rpm d3438e0967978e580be896bd85f1d953 2008.0/x86_64/apache-mpm-worker-2.2.6-8.3mdv2008.0.x86_64.rpm e72af335ec7c3c02b5a494fbd6e99e0e 2008.0/x86_64/apache-source-2.2.6-8.3mdv2008.0.x86_64.rpm 23fcdf29e21b0146fb5646baca2fa63b 2008.0/SRPMS/apache-2.2.6-8.3mdv2008.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLHQcamqjQ0CJFipgRAsJgAKDf5oc5UbEz3j+qsMn3tL6F8cujygCfY+cu MUj4lK2Wsb+qzbv2V+Ih30U= =VdZS -----END PGP SIGNATURE----- . Additionally the NSPR package has been upgraded to 4.8.4 that brings numerous upstream fixes. This update provides the latest versions of NSS and NSPR libraries and for which NSS is not vulnerable to this attack. The only ArubaOS component that seems affected by this issue is the HTTPS WebUI administration interface. If a client browser (victim) is configured to authenticate to the WebUI over HTTPS using a client certificate, an attacker can potentially use the victim's credentials temporarily to execute arbitrary HTTP request for each initiation of an HTTPS session from the victim to the WebUI. This would happen without any HTTPS/TLS warnings to the victim. This condition can essentially be exploited by an attacker for command injection in beginning of a HTTPS session between the victim and the ArubaOS WebUI. ArubaOS itself does not initiate TLS renegotiation at any point and hence is only vulnerable to scenario where a client explicitly requests TLS renegotiation. Captive Portal users do not seem vulnerable to this issue unless somehow client certificates are being used to authenticate captive portal users. AFFECTED ArubaOS VERSIONS 2.5.6.x, 3.3.2.x, 3.3.3.x, 3.4.0.x, 3.4.1.x, RN 3.1.x, 3.3.2.x-FIPS, 2.4.8.x-FIPS CHECK IF YOU ARE VULNERABLE The only ArubaOS component that seems affected by this issue is the HTTPS WebUI administration interface. ArubaOS is vulnerable only if its configuration permits WebUI administration interface clients to connect using either username/password or client certificates. If only one of the two authentication method is allowed, this issue does not seem to apply. Check if the following line appears in your configuration: web-server mgmt-auth username/password certificate If the exact line does not appear in the configuration, this issue does not apply. DETAILS An industry wide vulnerability was discovered in TLS protocol's renegotiation feature, which allows a client and server who already have a TLS connection to negotiate new session parameters and generate new key material. Renegotiation is carried out in the existing TLS connection. However there is no cryptographic binding between the renegotiated TLS session and the original TLS session. Specifically arbitrary HTTP requests can be injected in a HTTPS session where attacker (MITM) blocks HTTPS session initiation between client and server, establishes HTTPS session with the server itself, injects HTTP data and initiates TLS renegotiation with the server. Then attacker allows the renegotiation to occur between the client and the server. ArubaOS itself does not initiate TLS renegotiation at any point. The only ArubaOS component that seems affected by this issue is the HTTPS WebUI administration interface. Pre-requisites for this attack : 1. The attacker must be able to establish a MITM between the client and the server (ArubaOS WebUI). ArubaOS must be configured to allow certificate based HTTPS authentication for WebUI clients (client certs). Captive Portal users do not seem vulnerable to this issue unless somehow client certificates are being used to authenticate captive portal users. CVSS v2 BASE METRIC SCORE: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P) WORKAROUNDS Aruba Networks recommends that all customers apply the appropriate patch(es) as soon as practical. However, in the event that a patch cannot immediately be applied, the following steps will help to mitigate the risk: - - - Disable certificate based HTTPS authentication (and only allow username-password based authentication) for WebUI clients. Client's username-password authentication POST request will prohibit attacker's injected HTTP data from executing with client's cookie. CLI command: web-server mgmt-auth username/password - - - Permit certificate based HTTPS authentication ONLY and disable username-password based authentication to WebUI. This will prohibit attacker from establishing a HTTPS session with ArubaOS (for MITM) without a valid client cert. CLI command: web-server mgmt-auth certificate Note: This step won't stop command injection from attackers who have valid client certificates but their assigned management role privileges are lower than that of the admin. This attack may allow them to run commands at higher privilege than what is permitted in their role. - - - Do not expose the Mobility Controller administrative interface to untrusted networks such as the Internet. SOLUTION Aruba Networks recommends that all customers apply the appropriate patch(es) as soon as practical. The following patches have the fix (any newer patch will also have the fix): - - - - 2.5.6.24 - - - - 3.3.2.23 - - - - 3.3.3.2 - - - - 3.4.0.7 - - - - 3.4.1.1 - - - - RN 3.1.4 Please contact Aruba support for obtaining patched FIPS releases. Please note: We highly recommend that you upgrade your Mobility Controller to the latest available patch on the Aruba support site corresponding to your currently installed release. REFERENCES [1] http://extendedsubset.com/?p=8 [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 +---------------------------------------------------- OBTAINING FIXED FIRMWARE Aruba customers can obtain the firmware on the support website: http://www.arubanetworks.com/support. Aruba Support contacts are as follows: 1-800-WiFiLAN (1-800-943-4526) (toll free from within North America) +1-408-754-1200 (toll call from anywhere in the world) e-mail: support(at)arubanetworks.com Please, do not contact either "wsirt(at)arubanetworks.com" or "security(at)arubanetworks.com" for software upgrades. EXPLOITATION AND PUBLIC ANNOUNCEMENTS This vulnerability will be announced at Aruba W.S.I.R.T. Advisory: http://www.arubanetworks.com/support/alerts/aid-020810.txt SecurityFocus Bugtraq http://www.securityfocus.com/archive/1 STATUS OF THIS NOTICE: Final Although Aruba Networks cannot guarantee the accuracy of all statements in this advisory, all of the facts have been checked to the best of our ability. Aruba Networks does not anticipate issuing updated versions of this advisory unless there is some material change in the facts. Should there be a significant change in the facts, Aruba Networks may update this advisory. A stand-alone copy or paraphrase of the text of this security advisory that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. DISTRIBUTION OF THIS ANNOUNCEMENT This advisory will be posted on Aruba's website at: http://www.arubanetworks.com/support/alerts/aid-020810.txt Future updates of this advisory, if any, will be placed on Aruba's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. REVISION HISTORY Revision 1.0 / 02-08-2010 / Initial release ARUBA WSIRT SECURITY PROCEDURES Complete information on reporting security vulnerabilities in Aruba Networks products, obtaining assistance with security incidents is available at http://www.arubanetworks.com/support/wsirt.php For reporting *NEW* Aruba Networks security issues, email can be sent to wsirt(at)arubanetworks.com or security(at)arubanetworks.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at http://www.arubanetworks.com/support/wsirt.php (c) Copyright 2010 by Aruba Networks, Inc. This advisory may be redistributed freely after the release date given at the top of the text, provided that redistributed copies are complete and unmodified, including all date and version information. Service (DoS) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01963123 Version: 1 HPSBUX02498 SSRT090264 rev.1 - HP-UX Running Apache, Remote Unauthorized Data Injection, Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2009-12-21 Last Updated: 2009-12-21 Potential Security Impact: Remote unauthorized data injection, Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running Apache v2.0.59.12 and earlier. The vulnerability could be exploited remotely to inject unauthorized data or to create a Denial of Service (DoS). References: CVE-2009-3555 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.0.59.12 and previous. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2009-3555 (AV:N/AC:L/Au:N/C:N/I:P/A:P) 6.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following temporary software updates to resolve the vulnerability. NOTE: The vulnerability is resolved in OpenSSL 0.9.8l. HP-UX Apache v2.0.59.X versions use statically linked libraries. HP-UX Apache v2.0.59.13 is compiled with OpenSSL 0.9.8l. Other versions of HP-UX Apache require the HP-UX OpenSSL packages recommended in HPSBUX02482 SSRT090249, available here http://www.itrc.hp.com/service/cki/secBullArchive.do To review previously published Security Bulletins visit http://www.itrc.hp.com/service/cki/secBullArchive.do The depots are available are available using ftp. Host / Account / Password ftp.usa.hp.com / sb02498 / Secure12 HP-UX Release / Temporary Depot name / SHA-1 Sum B.11.11 (IPv4 and IPv6) / Apache 2.0.59.13 PA-64-32-1111.depot / 3B6BE547403C28926482192408D5D5AB603A403D B.11.23 PA-32 / Apache 2.0.59.13 IA-PA-32-1123.depot / 4809BAF0F83F78F60B7EC73FAF584D221B1CB4A7 B.11.23 IA-64 / Apache 2.0.59.13 IA-PA-64-1123.depot / 1D65F7D49883399F4D202E16754CF7DAE71E3B47 B.11.31 PA-32 / Apache 2.0.59.13 IA-PA-32-1131.depot / 943E21D4621B480B5E8E651ACB605B8F7EA47304 B.11.31 IA-64 / Apache 2.0.59.13 IA-PA-64-1131.depot / B8836FDB73434A3C26FB411E3F7CB3211129E5AC MANUAL ACTIONS: Yes Install Apache v2.0.59.13 or subsequent PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS For Apache IPv4 and IPv6 HP-UX B.11.11 ============= hpuxwsAPACHE.APACHE hpuxwsAPACHE.APACHE2 hpuxwsAPACHE.AUTH_LDAP hpuxwsAPACHE.AUTH_LDAP2 hpuxwsAPACHE.MOD_JK hpuxwsAPACHE.MOD_JK2 hpuxwsAPACHE.MOD_PERL hpuxwsAPACHE.MOD_PERL2 hpuxwsAPACHE.PHP hpuxwsAPACHE.PHP2 hpuxwsAPACHE.WEBPROXY action: install revision B.2.0.59.13 or subsequent HP-UX B.11.23 ============= hpuxwsAPCH32.APACHE hpuxwsAPCH32.APACHE2 hpuxwsAPCH32.AUTH_LDAP hpuxwsAPCH32.AUTH_LDAP2 hpuxwsAPCH32.MOD_JK hpuxwsAPCH32.MOD_JK2 hpuxwsAPCH32.MOD_PERL hpuxwsAPCH32.MOD_PERL2 hpuxwsAPCH32.PHP hpuxwsAPCH32.PHP2 hpuxwsAPCH32.WEBPROXY hpuxwsAPACHE.APACHE hpuxwsAPACHE.APACHE2 hpuxwsAPACHE.AUTH_LDAP hpuxwsAPACHE.AUTH_LDAP2 hpuxwsAPACHE.MOD_JK hpuxwsAPACHE.MOD_JK2 hpuxwsAPACHE.MOD_PERL hpuxwsAPACHE.MOD_PERL2 hpuxwsAPACHE.PHP hpuxwsAPACHE.PHP2 hpuxwsAPACHE.WEBPROXY action: install revision B.2.0.59.13 or subsequent HP-UX B.11.31 ============= hpuxwsAPCH32.APACHE hpuxwsAPCH32.APACHE2 hpuxwsAPCH32.AUTH_LDAP hpuxwsAPCH32.AUTH_LDAP2 hpuxwsAPCH32.MOD_JK hpuxwsAPCH32.MOD_JK2 hpuxwsAPCH32.MOD_PERL hpuxwsAPCH32.MOD_PERL2 hpuxwsAPCH32.PHP hpuxwsAPCH32.PHP2 hpuxwsAPCH32.WEBPROXY hpuxwsAPACHE.APACHE hpuxwsAPACHE.APACHE2 hpuxwsAPACHE.AUTH_LDAP hpuxwsAPACHE.AUTH_LDAP2 hpuxwsAPACHE.MOD_JK hpuxwsAPACHE.MOD_JK2 hpuxwsAPACHE.MOD_PERL hpuxwsAPACHE.MOD_PERL2 hpuxwsAPACHE.PHP hpuxwsAPACHE.PHP2 hpuxwsAPACHE.WEBPROXY action: install revision B.2.0.59.13 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 21 December 2009 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Summary ESX 3.x Console OS (COS) updates for samba, bzip2, and openssl packages. Refer to section "End of Product Availability FAQs" at http://www.vmware.com/support/policies/lifecycle/vi/faq.html for details. Extended support for ESX 3.0.3 ends on 2011-12-10. Users should plan to upgrade to at least ESX 3.5 and preferably to the newest release available. ESX 3.5 ------- Samba http://download3.vmware.com/software/vi/ESX350-201012408-SG.zip md5sum: 53a427d5d2213c51d57e8e8f7e3d544c http://kb.vmware.com/kb/1029999 bzip http://download3.vmware.com/software/vi/ESX350-201012409-SG.zip md5sum: 0a688d7153380fcb5d7ca0ac098e2d03 http://kb.vmware.com/kb/1030000 openssl http://download3.vmware.com/software/vi/ESX350-201012401-SG.zip md5sum: a8b1d9e4eabd14b6822bd1f8bf6dbf69 http://kb.vmware.com/kb/1029993 5. Corrected: 2009-12-01 02:59:22 UTC (RELENG_8, 8.0-STABLE) 2009-12-03 09:18:40 UTC (RELENG_8_0, 8.0-RELEASE-p1) 2009-12-01 03:00:16 UTC (RELENG_7, 7.2-STABLE) 2009-12-03 09:18:40 UTC (RELENG_7_2, 7.2-RELEASE-p5) 2009-12-03 09:18:40 UTC (RELENG_7_1, 7.1-RELEASE-p9) CVE Name: CVE-2009-4146, CVE-2009-4147 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:http://security.FreeBSD.org/>. Background The run-time link-editor, rtld, links dynamic executable with their needed libraries at run-time. It also allows users to explicitly load libraries via various LD_ environmental variables. II. Problem Description When running setuid programs rtld will normally remove potentially dangerous environment variables. Due to recent changes in FreeBSD environment variable handling code, a corrupt environment may result in attempts to unset environment variables failing. III. Impact An unprivileged user who can execute programs on a system can gain the privileges of any setuid program which he can run. On most systems configurations, this will allow a local attacker to execute code as the root user. IV. Workaround No workaround is available, but systems without untrusted local users, where all the untrusted local users are jailed superusers, and/or where untrusted users cannot execute arbitrary code (e.g., due to use of read only and noexec mount options) are not affected. Note that "untrusted local users" include users with the ability to upload and execute web scripts (CGI, PHP, Python, Perl etc.), as they may be able to exploit this issue. Solution Perform one of the following: 1) Upgrade your vulnerable system to 7-STABLE or 8-STABLE, or to the RELENG_8_0, RELENG_7_2, or RELENG_7_1 security branch dated after the correction date. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 7.1, 7.2, and 8.0 systems. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 7.x] # fetch http://security.FreeBSD.org/patches/SA-09:16/rtld7.patch # fetch http://security.FreeBSD.org/patches/SA-09:16/rtld7.patch.asc [FreeBSD 8.0] # fetch http://security.FreeBSD.org/patches/SA-09:16/rtld.patch # fetch http://security.FreeBSD.org/patches/SA-09:16/rtld.patch.asc b) Execute the following commands as root: # cd /usr/src # patch < /path/to/patch # cd /usr/src/libexec/rtld-elf # make obj && make depend && make && make install NOTE: On the amd64 platform, the above procedure will not update the ld-elf32.so.1 (i386 compatibility) run-time link-editor (rtld). On amd64 systems where the i386 rtld are installed, the operating system should instead be recompiled as described in <URL:http://www.FreeBSD.org/handbook/makeworld.html> VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. CVS: Branch Revision Path - ------------------------------------------------------------------------- RELENG_7 src/libexec/rtld-elf/rtld.c 1.124.2.7 RELENG_7_2 src/UPDATING 1.507.2.23.2.8 src/sys/conf/newvers.sh 1.72.2.11.2.9 src/libexec/rtld-elf/rtld.c 1.124.2.4.2.2 RELENG_7_1 src/UPDATING 1.507.2.13.2.12 src/sys/conf/newvers.sh 1.72.2.9.2.13 src/libexec/rtld-elf/rtld.c 1.124.2.3.2.2 RELENG_8 src/libexec/rtld-elf/rtld.c 1.139.2.4 RELENG_8_0 src/UPDATING 1.632.2.7.2.4 src/sys/conf/newvers.sh 1.83.2.6.2.4 src/libexec/rtld-elf/rtld.c 1.139.2.2.2.2 - ------------------------------------------------------------------------- Subversion: Branch/path Revision - ------------------------------------------------------------------------- stable/7/ r199981 releng/7.2/ r200054 releng/7.1/ r200054 stable/8/ r199980 releng/8.0/ r200054 - ------------------------------------------------------------------------- VII. Details follow: USN-927-1 fixed vulnerabilities in nss in Ubuntu 9.10. HP Secure Web Server (SWS) for OpenVMS running CSWS_JAVA V3.1 and earlier. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. CVE-2009-3555 has been assigned to this vulnerability. As a partial mitigation against this attack, this apache2 update disables client-initiated renegotiations. This is the case for the following configurations (the information in the changelog of the updated packages is slightly inaccurate): - - The "SSLVerifyClient" directive is used in a Directory or Location context. - - The "SSLCipherSuite" directive is used in a Directory or Location context. As a workaround, you may rearrange your configuration in a way that SSLVerifyClient and SSLCipherSuite are only used on the server or virtual host level. A complete fix for the problem will require a protocol change. Further information will be included in a separate announcement about this issue. In addition, this update fixes the following issues in Apache's mod_proxy_ftp: CVE-2009-3094: Insufficient input validation in the mod_proxy_ftp module allowed remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command. CVE-2009-3095: Insufficient input validation in the mod_proxy_ftp module allowed remote authenticated attackers to bypass intended access restrictions and send arbitrary FTP commands to an FTP server. For the stable distribution (lenny), these problems have been fixed in version 2.2.9-10+lenny6. This version also includes some non-security bug fixes that were scheduled for inclusion in the next stable point release (Debian 5.0.4). The oldstable distribution (etch), these problems have been fixed in version 2.2.3-4+etch11. For the testing distribution (squeeze) and the unstable distribution (sid), these problems will be fixed in version 2.2.14-2. This advisory also provides updated apache2-mpm-itk packages which have been recompiled against the new apache2 packages. Updated apache2-mpm-itk packages for the armel architecture are not included yet. They will be released as soon as they become available. We recommend that you upgrade your apache2 and apache2-mpm-itk packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch (oldstable) - ------------------------------------------- Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch11.dsc Size/MD5 checksum: 1071 dff8f31d88ede35bb87f92743d2db202 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3.orig.tar.gz Size/MD5 checksum: 6342475 f72ffb176e2dc7b322be16508c09f63c http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch11.diff.gz Size/MD5 checksum: 124890 c9b197b2a4bade4e92f3c65b88eea614 Architecture independent packages: http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.3-4+etch11_all.deb Size/MD5 checksum: 2247064 357f2daba8360eaf00b0157326c4d258 http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.3-4+etch11_all.deb Size/MD5 checksum: 6668542 043a6a14dc48aae5fa8101715f4ddf81 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch11_all.deb Size/MD5 checksum: 41626 27661a99c55641d534a5ffe4ea828c4b http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.2.3-4+etch11_all.deb Size/MD5 checksum: 275872 8ff0ac120a46e235a9253df6be09e4d5 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_alpha.deb Size/MD5 checksum: 346016 02b337e48ef627e13d79ad3919bc380d http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_alpha.deb Size/MD5 checksum: 407682 f01d7e23f206baed1e42c60e15fe240f http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_alpha.deb Size/MD5 checksum: 1017408 1c8dccbed0a309ed0b74b83667f1d587 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_alpha.deb Size/MD5 checksum: 449704 b227ff8c9bceaa81488fec48b81f18f6 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_alpha.deb Size/MD5 checksum: 450266 766ba095925ee31c175716084f41b3cf http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_alpha.deb Size/MD5 checksum: 444898 3b1d9a9531c82872d36ce295d6cba581 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_alpha.deb Size/MD5 checksum: 407030 eedabbc4930b3c14012f57ec7956847b http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_alpha.deb Size/MD5 checksum: 184920 2d152290678598aeacd32564c2ec37c2 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_amd64.deb Size/MD5 checksum: 409010 15d5dda7eb1e9e8d406cd9ff4b25e60f http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_amd64.deb Size/MD5 checksum: 408330 0bf271280295146f4ded8c02335e8fc1 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_amd64.deb Size/MD5 checksum: 1000068 f92b3deafb9ce263d0d66b753231a003 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_amd64.deb Size/MD5 checksum: 436268 9ef6b02f0ecf9905c14114a464c86f80 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_amd64.deb Size/MD5 checksum: 432320 b734b0c2f1d2177a828cff7d8e34d17c http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_amd64.deb Size/MD5 checksum: 342152 ef061f914027b41b788a31758d7c4e96 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_amd64.deb Size/MD5 checksum: 436766 deb97a3637ae8be3e016e37c038bc470 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_amd64.deb Size/MD5 checksum: 172802 0550f661c804ef0c0ec31e1928f5f97d arm architecture (ARM) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_arm.deb Size/MD5 checksum: 421056 b55b215aee8398e6388a73b421229db7 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_arm.deb Size/MD5 checksum: 408940 8782732ef6487ef268abf2856ec5e2c0 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_arm.deb Size/MD5 checksum: 408140 f3627e52eaf7a011a5a624ea25fa058b http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_arm.deb Size/MD5 checksum: 968448 ac1354c562e7969e47561f4cba3a859b http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_arm.deb Size/MD5 checksum: 346166 a8729d03737330075908c2b8b2f5ce0b http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_arm.deb Size/MD5 checksum: 157634 53c277ca7e52e7e60a523183e87beec3 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_arm.deb Size/MD5 checksum: 421782 b17f7ce0bfd6fee4877d9bccaf82770e http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_arm.deb Size/MD5 checksum: 417026 03b845039bf49fba64f064acda350f43 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_hppa.deb Size/MD5 checksum: 444058 16fb9ac5807fcf161321ffc8467e963d http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_hppa.deb Size/MD5 checksum: 179532 b1f7b89ac1e830b72e30c9476b813263 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_hppa.deb Size/MD5 checksum: 352116 f34f19a1bf40a37695ac0aeb3f5b6d10 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_hppa.deb Size/MD5 checksum: 443324 e7106e9195fcd9f34ced7bccb009cbb7 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_hppa.deb Size/MD5 checksum: 1078948 29a60062b3f7676f768dda1d4cdb78fd http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_hppa.deb Size/MD5 checksum: 439968 6ff5b95ba06596c04f2fc7dc3adac7ac http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_hppa.deb Size/MD5 checksum: 410880 28ce1d24c4e152624c38330d34781636 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_hppa.deb Size/MD5 checksum: 409994 2ce21d9fc51fbbeb5e05ac7c418d7e11 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_i386.deb Size/MD5 checksum: 409776 04bafa059e90c14851f290c02fc7a29e http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_i386.deb Size/MD5 checksum: 963818 f2755fd250837dd878a24ffc8527855d http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_i386.deb Size/MD5 checksum: 425034 fc0b075a77853494886719b1bf4d7092 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_i386.deb Size/MD5 checksum: 421206 d2758678dc6dcfb2298a5e69dbd199d0 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_i386.deb Size/MD5 checksum: 425510 5df035120241567d62ba4154a7ade25f http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_i386.deb Size/MD5 checksum: 161256 614f006996e6309829bf7c80bb95e3ed http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_i386.deb Size/MD5 checksum: 410518 833b5256083de5f76d83354f63916af2 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_i386.deb Size/MD5 checksum: 343876 435638e472ccb187c7713f96840cf156 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_ia64.deb Size/MD5 checksum: 407664 9929d570df08ea81c10235d8cfad8cec http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_ia64.deb Size/MD5 checksum: 231808 505ed0109a851680126951f228f4ed40 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_ia64.deb Size/MD5 checksum: 491120 d1ef23e9bbd457b1c30d50234050b112 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_ia64.deb Size/MD5 checksum: 498202 f430c9b4231122f996799b45d68596a3 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_ia64.deb Size/MD5 checksum: 407018 f721b04b90b8b2b5ec76916488395bdd http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_ia64.deb Size/MD5 checksum: 360664 08763e41786b3c5b28cf3e27d234419d http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_ia64.deb Size/MD5 checksum: 497388 6ef80d442fbf5046e78b9b2a0637adb9 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_ia64.deb Size/MD5 checksum: 1204566 d1cc5f38e5683c539db6673611585b67 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_mips.deb Size/MD5 checksum: 430112 01c3cf5fc888bff3967c95736b3caf40 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_mips.deb Size/MD5 checksum: 407674 688656128f0f46e8b35da61d731e244f http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_mips.deb Size/MD5 checksum: 434122 791a223b58a6a3a00fdd5517decc6ff2 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_mips.deb Size/MD5 checksum: 951736 68a93c433a24dd42b461907c2b61c6d2 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_mips.deb Size/MD5 checksum: 407022 10cf7a6fa3ad60183a80b7fddc08ed98 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_mips.deb Size/MD5 checksum: 350066 ab3498abf9ddc41f0665be9c2912beab http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_mips.deb Size/MD5 checksum: 434784 2d07f9376a7c7eb6229e0c5238e604fc http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_mips.deb Size/MD5 checksum: 169932 db0ecd6b89594ecbff3bacd9d184f808 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_mipsel.deb Size/MD5 checksum: 428958 3c7b9e69ccbeb0db17d437ece3717b65 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_mipsel.deb Size/MD5 checksum: 407040 61a67a76dd0acfaeb747d5ee745cb3fa http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_mipsel.deb Size/MD5 checksum: 433736 74adf126949edfd4b1af734b3a8255f8 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_mipsel.deb Size/MD5 checksum: 951730 3c9d5a12163e7d1c939d26829a4454f1 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_mipsel.deb Size/MD5 checksum: 407694 0297490b8b4aff5e1a4527a9c897fbee http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_mipsel.deb Size/MD5 checksum: 350302 843a3c227ba43dc4b882c96cad62a6eb http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_mipsel.deb Size/MD5 checksum: 434220 b18b6688a18a11d7bfa20d486c13ae64 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_mipsel.deb Size/MD5 checksum: 168814 6eedc4fb9e8027cf6d11c427a1cc4f8c powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_powerpc.deb Size/MD5 checksum: 1061292 0a43b7054755c361229d5e14db9c3156 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_powerpc.deb Size/MD5 checksum: 432806 ebe9b3113da3361dabf67acd291f9d93 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_powerpc.deb Size/MD5 checksum: 168374 ab7eb4de4a4c224a94698ebb67f627ea http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_powerpc.deb Size/MD5 checksum: 433416 0c53941e7e8765780e4e4a71f81a592b http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_powerpc.deb Size/MD5 checksum: 354920 0682a419e0d59ff5a2af1f322991b157 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_powerpc.deb Size/MD5 checksum: 410150 69ddc8b0b8ec235e65eabde0adbc1db7 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_powerpc.deb Size/MD5 checksum: 428826 f556fd9726b4c66bbe6fdc05b84d9918 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_powerpc.deb Size/MD5 checksum: 409396 d4b779470977873916bff7353829f172 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_s390.deb Size/MD5 checksum: 437364 0d844765789f2fcc4cf0c24e755b4c3d http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_s390.deb Size/MD5 checksum: 994710 63d476187cc9eed384ff792ce8b6f471 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_s390.deb Size/MD5 checksum: 443278 114375b6439d8a9cf344dd4829c7b6d2 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_s390.deb Size/MD5 checksum: 407682 e0db3031b4bb381a0f3178569d4c514a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_s390.deb Size/MD5 checksum: 442268 219d9f7f67d2a53a3c3e700c68a6d682 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_s390.deb Size/MD5 checksum: 348624 ac97c9840e0cb11a1cf1e44fd1875015 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_s390.deb Size/MD5 checksum: 407026 6233c65e8860b416d7a6265ae2c2eda4 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_s390.deb Size/MD5 checksum: 177986 634687237fd58d539bc9492415a94b77 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_sparc.deb Size/MD5 checksum: 418896 96bdf44ad9d8c1d86ee3aaf383c9dcce http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_sparc.deb Size/MD5 checksum: 412078 c9aab17ccba1846ea02df78f636a28a6 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_sparc.deb Size/MD5 checksum: 342696 7dd353d553f6a495c506b22f60ff2a0d http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_sparc.deb Size/MD5 checksum: 158054 60de9a240c905bdb6ffa0ab6c032096d http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_sparc.deb Size/MD5 checksum: 422966 edb7194c73d08c0bdb1eed6bd19ceb53 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_sparc.deb Size/MD5 checksum: 422444 ad0a85ada33d687e1fc67b0fa3c40244 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_sparc.deb Size/MD5 checksum: 960150 0dae013a3e07502409918ff649cb1375 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_sparc.deb Size/MD5 checksum: 411290 88e769a08329b6728c6fd0770d241874 Debian GNU/Linux 5.0 alias lenny (stable) - ----------------------------------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz Size/MD5 checksum: 6396996 80d3754fc278338033296f0d41ef2c04 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny6.dsc Size/MD5 checksum: 1673 f6846ac2d9cbd7887629a9c503154310 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny6.diff.gz Size/MD5 checksum: 145719 fd456ef168b7f1ca1055ffbca1df53db Architecture independent packages: http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny6_all.deb Size/MD5 checksum: 2060318 c2499fa1040a9ace89c1a969de4db870 http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny6_all.deb Size/MD5 checksum: 6736558 e09131a305cf2e51d3c14ed7c1beaf5d http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny6_all.deb Size/MD5 checksum: 45238 922ce7e9d14885bab9c9cbbfab99fbd3 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 209720 29861b61a3ae0912a7eb1ba2096b0421 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 84444 af60f321516a06fc9588433ba2c1a88e http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 256598 730d50c0f57ba7aad84e6897217bf42d http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 2402082 b932e642a152e30f948437d7313d2dcf http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 82728 bb04bbeae7865acad1ae89e943702623 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_alpha.deb Size/MD5 checksum: 198236 61b2f1529a056145d9ea8a87c5c5e8c0 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 208690 f6d15e0b6fa15a3738e9130b4044ce37 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 849014 dddd323a55b010c29a8626194b71a7a1 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 147844 40f11b60e0f5154680f16c1c67943101 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 261662 7b88269d9ce2877809a0f47daa4e756d http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_alpha.deb Size/MD5 checksum: 262336 eced46181f89a7f8ee636c0dce4789f7 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 210246 bb629f54f383bfcce66a6bf0bc1a2b6d http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 825462 051201fb8baa9a7a961961dd5082929a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 257694 3b8c5bff06a870ccd062ce53771a43a4 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 211268 5e07756440fecd3a3ee3815a6cff3ff5 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 258424 92c5467fbef1d4da6803507b679df099 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 82532 40718aa8ebb6532404fad4b5ee2a1e09 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 84140 743b1e0fd988539a7346bddbcd573767 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 253708 bcc5c9f767c1e62913af45827f04b83f http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_amd64.deb Size/MD5 checksum: 195214 42f4650b895a51b853c253bbbd1e2cc0 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 2455308 9b8792a5defa5193d825d31dc47b43f2 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_amd64.deb Size/MD5 checksum: 144980 240232c2f4932579c60ecee786c0af26 arm architecture (ARM) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 224760 9615e8207a01d2759de57b58cd885286 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 83230 c840cb7342a3a83e0587fd3baacce760 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 2327178 39819fd5f56728620aaefdbe10887c2b http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 147202 f7ebf064272389cf2dd7db7bfe3ff267 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_arm.deb Size/MD5 checksum: 161596 b7a2763998f12394ecae68df6ec73fbb http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 223898 fbd3f6bc3340643f55862e5b14947345 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 786918 a142a6fbee216aaa87378bdc53773eb2 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 209812 2e4b61b494abdd8e52b219456a82e499 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 219946 4ac3564788d25b492a833e2df463b41e http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 81412 abe1efff8619aac89534c3f4d57c5356 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_arm.deb Size/MD5 checksum: 211008 865b518f1a18de1020feb2212b137a6c armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 212612 2b8654bdda7346a2a7804800e9a11d8e http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 802766 535b466511548a5264b0da3a3a348381 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 226068 8921ab3294cf45178f3b90fd51fbafc3 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 213694 38498cbd15341da4279e4193a4708c6c http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 226354 57f22f55c3ca485b5974e1f2a4ef1414 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 83934 6a6a2de840f638874d8ae05611f142b9 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 82284 b225eb7806650013baccae619ad08f2b http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 2340926 83bb45aa97542f6f796780c8a2d24c8b http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 221894 872e3f1df2080a84cca36f48e6c8e575 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_armel.deb Size/MD5 checksum: 151226 3172e8ba667991da2881ea6a7b2781cc hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 84022 f603a1c369bbc7d05efe1ad99325e020 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 153048 0568fcb47c9cad398c7fd7abe2276828 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 82214 f27d31e710ba6640471c47a6fc240aad http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 246406 f18257777ba62d65ceb3aa4842415c74 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 241578 e71e710d7889e79b85e4c20b539a4d26 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 211730 a9913999aac5559db1e75835d87a2efd http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 896810 e8e2d9459750e5d9be76c00923a25696 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 245816 6a876fb502903c7bfcb5a4b8dad71a7a http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 213028 f072f0ca44edc122c1b3e1da847f1c8c http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_hppa.deb Size/MD5 checksum: 183316 41a32b0fd061c4f2afbd740af5e8325a http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_hppa.deb Size/MD5 checksum: 2385020 366e6e9bd1dec0ba6a784813785f13d3 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 82366 ab10d1ab26c914777c5296fe9ccfe027 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 241326 2ee9101bf92fcac69249094b3ca11e2a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 240776 43a654cf0439fc97997a57baec5e2995 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 84104 f73a1bff0a8a4426e63803c4e5c67c60 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 783440 053ba7ef4fbb56547200c32c35ac8a0e http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 143414 c20c10a3eadac1c494a5750888875800 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 237396 06841f14531fab0adb92177af849c8be http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 211420 69c67bd0052c70322924b901ba5f5428 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 2324892 87c51cc1fb8ae2532adcfa601a7b5af4 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_i386.deb Size/MD5 checksum: 212726 11b86a68880fa98a130e449dec0fbbcc http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_i386.deb Size/MD5 checksum: 179396 4ae5716372fe19991b0d8a4cc751d45f ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 162732 0a9a153e3703f9dbd33e325d67373bce http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_ia64.deb Size/MD5 checksum: 247068 39445ee73d2076bfa589a5840a3d6024 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 1036624 80b366704dc888c2bea8d84c316faf33 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 208668 c2b06d3c767fa737fbf5e1c3d50d001c http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 311692 77ff8879c2853c4b33903299ec3120c8 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 312616 1c20b667ebbd43b0ee1b01cd1cdd991d http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 83920 a383c7aef1758f963c019793af7b5f92 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 2317952 803f0b941814cbbc49f4e37bc3b9ca95 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 209700 59ab45d2c7c2168a941ff2fc842268e1 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 304670 067ece69f8b9518f9b18cd948c4df971 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_ia64.deb Size/MD5 checksum: 85802 9294d252435e8026d6135bf8efdfaf46 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 2465158 a36366e07810785cd1f2dc3b020d3486 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 780460 a5daeb91029f3b027a810ee22456ebd3 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 233408 ec9001ee4c996d0b14a9e67d9ce380ec http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 82082 1fc55f0526e3bf90c2156364055a1627 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_mips.deb Size/MD5 checksum: 171444 789208a77578e49ebca9be904c99aff3 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 83688 8612d0c31dee19c557723b08354c20d7 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 149712 ac8ddf3ab4a3b0fb255adbc588e57305 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 209718 8af3815f7794f4e60d72ba52d3bd19c4 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 229494 c2ef345862009f2a2b979205fec22567 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 208698 246c0001aaa98be577f6c5f004330285 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_mips.deb Size/MD5 checksum: 233980 ce7b3760443a98b0ddc0607a7a9842bf mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 228110 e45b1c3294102e26eee671b860f4aabc http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 208710 1403636fff03ab43353cdffdef62ffd7 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 83708 9b1c257025920f6dd0a7a2b231c97141 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 209740 546504d6f0a2a449e9bcd618f4700ce5 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 82128 31209b35ecb423f2d88347df6c08eddb http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 2420074 b57ff2a01ee7f29d0dcba4214dc7fc21 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 232140 3dfff4c54077cb221e19533f19538834 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 778974 d9d0084ea48aaa56d2f99c632711d084 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_mipsel.deb Size/MD5 checksum: 169470 f04a239ba4f1d6ae4ff8ce0960f784fd http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 232796 8ced513dc28d7165fd76076803b98188 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_mipsel.deb Size/MD5 checksum: 150024 c2a66c2c63eeb66df98b136cceadc780 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 84570 b43f074242385089dda2aae2e9ae1595 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 915976 723f3349b829894595b913099f06ecc2 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 257408 c4bab781417526a0dfdb2240ab2fef07 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 2495210 6fb817120bcb095006fd09d2318f28ee http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_powerpc.deb Size/MD5 checksum: 195192 6b4d950e48c6cdfd00d403e42b719b40 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 208684 ece82cc979cff6832d51a6caf51f38b5 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 82908 c54a24103b503b5de1b27993ee33610f http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 160960 361e2bae65d5f1303073d8e4d88ccdb7 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 209714 81fbc6671b2d4137dc52232e9d572ea9 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 258234 6dbd57dc907e93b5e9dcd3058e99b30f http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_powerpc.deb Size/MD5 checksum: 253294 696e2e9219d6e029c0c6f024045a4d5f s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 82544 4e332ccedffd13b1e7b866fe71cf8a9b http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_s390.deb Size/MD5 checksum: 197642 e32a924a47b90452356956e3fe39d34e http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 255970 197eea5c422ecf37ec592bf9612c3b2f http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 208694 33dddaec24eb4475411eb55abb5d5e71 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 150912 2aa00b2fb3b84a536030f5b5635115bc http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 209726 cf54089c8a33087820f8c9359e461625 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 2409108 1b6e40f5d2772a0a1f26424f4b470136 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 824586 ff52926d953f8b5cbde82ac31176dedb http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 259924 655aca8f56383ebd106ded50d8f557ea http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 260610 12751082d3f1466735d1b3d395d63690 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_s390.deb Size/MD5 checksum: 84310 9aa451ccb1513c05f4ccc0319124181e sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 2231018 fcdbb08c45ff474592590fac0aa78dac http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 84568 6dcf4195e216a22ef2919806d55d5098 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 237224 9bf96cc5f932643b1c55c6a9fa238af1 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 241474 ed8557af547d9d55a075fca5cf88488d http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 82888 bde0baf83e2e972b398be6a500f77125 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_sparc.deb Size/MD5 checksum: 177562 09cbb49296407c83ef1575b003dfb129 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 241014 2c10b920cdfec918af3eb148e29fca0f http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 212798 28edff7612bb824fc20d88c29b8b7e1f http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 781748 63e7003956d73b1a04e544c00eaa7728 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 213976 b7e758d0a2e6574944d27e2d6e40f60c http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_sparc.deb Size/MD5 checksum: 146596 c37cea33bed94a68326b511a66bf050e These files will probably be moved into the stable distribution on its next update

Trust: 3.96

sources: NVD: CVE-2009-3555 // JVNDB: JVNDB-2009-002319 // CERT/CC: VU#120541 // BID: 36935 // PACKETSTORM: 100765 // PACKETSTORM: 98419 // PACKETSTORM: 94088 // PACKETSTORM: 83521 // PACKETSTORM: 88167 // VULHUB: VHN-41001 // PACKETSTORM: 86075 // PACKETSTORM: 97489 // PACKETSTORM: 84183 // PACKETSTORM: 96463 // PACKETSTORM: 137201 // PACKETSTORM: 83415 // PACKETSTORM: 91309 // PACKETSTORM: 111920 // PACKETSTORM: 82647

AFFECTED PRODUCTS

vendor:ciscomodel:unified communications manager 5.1scope: - version: -

Trust: 2.1

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 1.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 1.3

vendor:oraclemodel:fusion middlewarescope:eqversion:11.1.1.3.0

Trust: 1.1

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 1.1

vendor:oraclemodel:fusion middlewarescope:eqversion:11.1.1.2.0

Trust: 1.1

vendor:ibmmodel:http serverscope:eqversion:7.0

Trust: 1.1

vendor:ibmmodel:websphere application serverscope:eqversion:6.1

Trust: 1.1

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 1.1

vendor:ibmmodel:http serverscope:eqversion:6.0.2

Trust: 1.1

vendor:vmwaremodel:vcenterscope:eqversion:4.1

Trust: 1.1

vendor:canonicalmodel:ubuntu linuxscope:eqversion:9.10

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.04

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0

Trust: 1.0

vendor:gnumodel:gnutlsscope:lteversion:2.8.5

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:12

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:13

Trust: 1.0

vendor:f5model:nginxscope:gteversion:0.1.0

Trust: 1.0

vendor:f5model:nginxscope:lteversion:0.8.22

Trust: 1.0

vendor:mozillamodel:nssscope:lteversion:3.12.4

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.10

Trust: 1.0

vendor:apachemodel:http serverscope:lteversion:2.2.14

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:9.04

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:14

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:11

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:0.9.8k

Trust: 1.0

vendor:sunmodel:jre 17scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 16scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 10scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 11scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 22scope:neversion: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 24scope:neversion: -

Trust: 0.9

vendor:sunmodel:sdk 24scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 15scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 07scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.6.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.5.0 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 01scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 10scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 16scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 19scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 16scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 18scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 11scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 0 10scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 10scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 21scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 21scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 02scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 22scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 26scope:neversion: -

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 18scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 22scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 02scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.6.0 01scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.5

Trust: 0.9

vendor:ciscomodel:ace module a2scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.5.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 22scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 06scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.6.0 19scope:neversion: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 22scope:eqversion:1.5

Trust: 0.9

vendor:barracudamodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnutlsmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:apachemodel:http serverscope:ltversion:2.2.15

Trust: 0.8

vendor:apachemodel:http serverscope:ltversion:2.3.6

Trust: 0.8

vendor:ibmmodel:db2scope:ltversion:9.1 fp9

Trust: 0.8

vendor:ibmmodel:db2scope:ltversion:9.5 fp6a

Trust: 0.8

vendor:ibmmodel:db2scope:ltversion:9.7 fp2

Trust: 0.8

vendor:ibmmodel:http serverscope:eqversion:2.0.47.x

Trust: 0.8

vendor:ibmmodel:http serverscope:eqversion:6.1

Trust: 0.8

vendor:ibmmodel:sdk,scope:eqversion:1.4.2

Trust: 0.8

vendor:ibmmodel:sdk,scope:eqversion:1.5

Trust: 0.8

vendor:ibmmodel:websphere application serverscope:eqversion:6.0.2

Trust: 0.8

vendor:ibmmodel:websphere application serverscope:eqversion:7.0

Trust: 0.8

vendor:mozillamodel:firefoxscope:ltversion:3.5.9

Trust: 0.8

vendor:mozillamodel:firefoxscope:ltversion:3.6.2

Trust: 0.8

vendor:mozillamodel:seamonkeyscope:ltversion:2.0.4

Trust: 0.8

vendor:mozillamodel:thunderbirdscope:ltversion:3.0.4

Trust: 0.8

vendor:openofficemodel:openoffice.orgscope:eqversion:2.x

Trust: 0.8

vendor:openofficemodel:openoffice.orgscope:ltversion:3.2.1

Trust: 0.8

vendor:opensslmodel:opensslscope:ltversion:0.9.8l

Trust: 0.8

vendor:proftpdmodel:proftpdscope:ltversion:1.3.2c

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:3.0.3

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:3.5

Trust: 0.8

vendor:vmwaremodel:vcenterscope:eqversion:4.0

Trust: 0.8

vendor:vmwaremodel:virtualcenterscope:eqversion:2.5

Trust: 0.8

vendor:vmwaremodel:vsphere update managerscope:eqversion:1.0

Trust: 0.8

vendor:vmwaremodel:vsphere update managerscope:eqversion:4.0

Trust: 0.8

vendor:vmwaremodel:vsphere update managerscope:eqversion:4.1

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.3

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.3

Trust: 0.8

vendor:oraclemodel:opensolarisscope: - version: -

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:server 10.1.0.5

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:server 10.2.0.3

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:server 10.2.0.4

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:server 10.2.0.5

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:server 11.1.0.7

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:server 11.2.0.1

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:server 11.2.0.2

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.0 mp2

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.0.2

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.1.2.3

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.1.3.5

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.1.4.0.1

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.1.4.3

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.3.2

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:10.3.3

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:7.0 sp7

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:8.1 sp6

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:8.1.6

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:9.0

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:9.1

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:9.2 mp3

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:9.2.3

Trust: 0.8

vendor:oraclemodel:fusion middlewarescope:eqversion:9.2.4

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:sybasemodel:sap sybase adaptive server enterprisescope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope:lteversion:5.0 update 25

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope:lteversion:6 update 21

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:1.4.2_27

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:5.0 update 25

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:6 update 21

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(sparc)

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(x86)

Trust: 0.8

vendor:sun microsystemsmodel:sdkscope:lteversion:1.4.2_27

Trust: 0.8

vendor:sun microsystemsmodel:glassfish enterprise serverscope:eqversion:v2.1.1

Trust: 0.8

vendor:sun microsystemsmodel:java enterprise systemscope:eqversion:2005q4

Trust: 0.8

vendor:sun microsystemsmodel:java enterprise systemscope:eqversion:5

Trust: 0.8

vendor:sun microsystemsmodel:java system application serverscope:eqversion:8.0

Trust: 0.8

vendor:sun microsystemsmodel:java system application serverscope:eqversion:8.1

Trust: 0.8

vendor:sun microsystemsmodel:java system application serverscope:eqversion:8.2

Trust: 0.8

vendor:sun microsystemsmodel:java system web proxy serverscope:eqversion:4.0 - 4.0.12

Trust: 0.8

vendor:sun microsystemsmodel:java system web serverscope:eqversion:6.1

Trust: 0.8

vendor:sun microsystemsmodel:java system web serverscope:eqversion:7.0

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:2.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux clientscope:eqversion:2008

Trust: 0.8

vendor:turbo linuxmodel:turbolinux fujiscope:eqversion:( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 (x64) ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:hewlett packardmodel:hp systems insight managerscope:ltversion:7.0

Trust: 0.8

vendor:hewlett packardmodel:hp virtual connectscope:ltversion:8gb 24 port fiber channel module 3.00 (vc ( virtual connect ) 4.40 )

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:hewlett packardmodel:hpe matrix operating environmentscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hpe systems insight managerscope: - version: -

Trust: 0.8

vendor:blue coatmodel:directorscope: - version: -

Trust: 0.8

vendor:blue coatmodel:intelligencecenterscope: - version: -

Trust: 0.8

vendor:blue coatmodel:packetshaperscope: - version: -

Trust: 0.8

vendor:blue coatmodel:proxyavscope: - version: -

Trust: 0.8

vendor:blue coatmodel:proxyclientscope: - version: -

Trust: 0.8

vendor:blue coatmodel:reporterscope: - version: -

Trust: 0.8

vendor:blue coatmodel:proxysgscope: - version: -

Trust: 0.8

vendor:blue coatmodel:sgosscope:eqversion:4

Trust: 0.8

vendor:blue coatmodel:sgosscope:eqversion:5

Trust: 0.8

vendor:blue coatmodel:sgosscope:eqversion:6

Trust: 0.8

vendor:microsoftmodel:windows 2000scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x32)

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x86)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(x64)

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:3 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.7.z extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc node supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.2.z (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.3.z (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:necmodel:csviewscope: - version: -

Trust: 0.8

vendor:necmodel:websam assetsuitescope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus application serverscope:eqversion:enterprise version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application serverscope:eqversion:standard version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application serverscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:cosminexus clientscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:light version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:professional version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:standard version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:cosminexus developer's kit for javascope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus serverscope:eqversion:- standard edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus serverscope:eqversion:- web edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:- standard edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:- web edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:developer's kit for javascope: - version: -

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:- security enhancement

Trust: 0.8

vendor:hitachimodel:processing kit for xmlscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:enterprise

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:standard

Trust: 0.8

vendor:hitachimodel:ucosminexus clientscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:light

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:standard

Trust: 0.8

vendor:hitachimodel:ucosminexus operatorscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus portal frameworkscope:eqversion:entry set

Trust: 0.8

vendor:hitachimodel:ucosminexus servicescope:eqversion:architect

Trust: 0.8

vendor:hitachimodel:ucosminexus servicescope:eqversion:platform

Trust: 0.8

vendor:sunmodel:jdk 01-b06scope:eqversion:1.6

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:ciscomodel:ace appliance a1scope:eqversion:4710

Trust: 0.6

vendor:ciscomodel:css11500 content services switch sscope:eqversion:7.30

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:ciscomodel:ace application control engine module 3.0 a2scope:neversion: -

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 1.5.0 12scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.6.0 2scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 07-b03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 11scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 11-b03scope:eqversion:1.5

Trust: 0.6

vendor:ciscomodel:unified communications manager su1scope:eqversion:6.1

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 07scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.6.0 01scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified computing system blade-server 4.0 n2scope:neversion: -

Trust: 0.6

vendor:sunmodel:jre 1.6.0 20scope: - version: -

Trust: 0.6

vendor:ciscomodel:css11500 content services switch sscope:eqversion:7.20

Trust: 0.6

vendor:microsoftmodel:windows xp home sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista editionscope:eqversion:x640

Trust: 0.3

vendor:sunmodel:java system directory server patch6scope:eqversion:5.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:application velocity systemscope:eqversion:0

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.43

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.42.3

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel esscope:eqversion:41.0

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:8.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)9

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.0

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.7

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.6.4

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:unified intelligent contact management enterprisescope:neversion:8.0(1)

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16009.3.1

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:microsoftmodel:windows xp professional editionscope:eqversion:x64

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(2)

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:4.1

Trust: 0.3

vendor:oraclemodel:weblogic server gascope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systemsscope:eqversion:20080

Trust: 0.3

vendor:f5model:wanjetscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:unified contact center hostedscope:eqversion:7.1(5)

Trust: 0.3

vendor:ciscomodel:application networking managerscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.63

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.2.41

Trust: 0.3

vendor:opensslmodel:project openssl b-36.8scope:eqversion:0.9.6

Trust: 0.3

vendor:microsoftmodel:windows vista business sp2scope: - version: -

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55008.2(1.16)

Trust: 0.3

vendor:ciscomodel:unified callmanager 3.3 sr2ascope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 100scope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.2.173.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0.0.201

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchange mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 123scope: - version: -

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34009.1.1

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:java system application serverscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:ciscomodel:ace series application control engine appliances 3.0 a3scope:neversion:4700

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 114scope: - version: -

Trust: 0.3

vendor:ibmmodel:os/400 v5r4m0scope: - version: -

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:sunmodel:opensolaris build snv 45scope: - version: -

Trust: 0.3

vendor:arubanetworksmodel:arubaos rnscope:neversion:3.1.4

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:10.0

Trust: 0.3

vendor:linksysmodel:etherfast befw11s4 wireless ap cable/dsl router bscope:eqversion:+1.37.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.2.1

Trust: 0.3

vendor:proftpdmodel:project proftpd 1.3.2bscope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0.0.52

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 28scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8lscope:neversion: -

Trust: 0.3

vendor:sunmodel:java system web server updatescope:eqversion:7.01

Trust: 0.3

vendor:bluemodel:coat systems directorscope:eqversion:5.4

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.8

Trust: 0.3

vendor:hpmodel:systems insight manager cscope:eqversion:05.00.02

Trust: 0.3

vendor:prozillamodel:download accelaratorscope:eqversion:1.4.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.51

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:meeting exchange web conferencing serverscope:eqversion:-0

Trust: 0.3

vendor:matrixsslmodel:matrixsslscope:neversion:1.8.8

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.10

Trust: 0.3

vendor:sunmodel:java system web server updatescope:eqversion:7.06

Trust: 0.3

vendor:sunmodel:java system web server updatescope:eqversion:7.02

Trust: 0.3

vendor:sunmodel:java system web proxy serverscope:eqversion:4.0.5

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:unified ip phone 7911gscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:2000

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp3scope:eqversion:10

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for domino mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:emcmodel:rsa data protection manager appliancescope:eqversion:3.5

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2)12

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.7

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.42.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 67scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris svn 126scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 51scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp home sp2scope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 0.3

vendor:turbolinuxmodel:clientscope:eqversion:2008

Trust: 0.3

vendor:hpmodel:virtual connect 8gb 24-port fc modulescope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.0(1)

Trust: 0.3

vendor:freebsdmodel:7.0-release-p12scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.1 sr8ascope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.6.1

Trust: 0.3

vendor:microsoftmodel:windows vista home basic sp1scope: - version: -

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 77scope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.80

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:8

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.2.5

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34009.4.5

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.2.2

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit edition versionscope:eqversion:2003

Trust: 0.3

vendor:sunmodel:opensolaris build snv 82scope: - version: -

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34009.3

Trust: 0.3

vendor:proftpdmodel:project proftpd ascope:eqversion:1.3

Trust: 0.3

vendor:freebsdmodel:7.0-stablescope: - version: -

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:5.2.4.8

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:70

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.3.1

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 126scope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.2

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.24)

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15000

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows advanced serverscope:eqversion:2000

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system directory serverscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.5

Trust: 0.3

vendor:bsdperimetermodel:pfsensescope:eqversion:1.2.1

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.32

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2.19)

Trust: 0.3

vendor:zeusmodel:web server r3scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:unified callmanager 3.3 sr3scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:freebsdmodel:7.1-stablescope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5)

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:ciscomodel:fwsm for cisco catalyst seriesscope:eqversion:6500/76003.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:openvpnmodel:2.1-rc21scope:neversion: -

Trust: 0.3

vendor:microsoftmodel:windows vistascope:eqversion:0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:2.5.6.0

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:proftpdmodel:project proftpd rc3scope:eqversion:1.3.2

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111scope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.6

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 118scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus processing kit for xmlscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip phone sipscope:eqversion:8.8(0)

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.5.2

Trust: 0.3

vendor:sunmodel:java system web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:fwsm for cisco catalyst seriesscope:eqversion:6500/7600

Trust: 0.3

vendor:ciscomodel:security agent for callmanagerscope:eqversion:4.5.1.628

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.6.1

Trust: 0.3

vendor:oraclemodel:weblogic server mp3scope:eqversion:9.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 112scope: - version: -

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:6.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.5

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.3-2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 96scope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.12

Trust: 0.3

vendor:microsoftmodel:windows professional sp3scope:eqversion:2000

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:rpathmodel:appliance platform linux servicescope:eqversion:1

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:7936

Trust: 0.3

vendor:sunmodel:opensolaris build snv 129scope:neversion: -

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34009.4.6

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:20080

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)82

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15009.4.6

Trust: 0.3

vendor:f5model:firepassscope:eqversion:5.4.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 36scope: - version: -

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.1

Trust: 0.3

vendor:arubanetworksmodel:arubaos rnscope:eqversion:3.1.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 48scope: - version: -

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.14

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:32.05

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)7

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:3.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp1scope:eqversion:2000

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:6.1.0.102

Trust: 0.3

vendor:f5model:firepassscope:eqversion:5.5

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.1

Trust: 0.3

vendor:microsoftmodel:windows vista businessscope: - version: -

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.3

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.6

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 50scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.2 sr4bscope: - version: -

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systemsscope:eqversion:20080

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2)14

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.3

Trust: 0.3

vendor:freebsdmodel:-release-p9scope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.5.0

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.6

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55008.3(0.08)

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:microsoftmodel:windows server itanium sp2scope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:unified ip phone sip sscpscope:eqversion:8.0(6)

Trust: 0.3

vendor:microsoftmodel:windows xp home sp3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ironport email security appliance x-seriesscope:eqversion:0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:3.0.4

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:4.1.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.5.2

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.43

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:5.2

Trust: 0.3

vendor:sunmodel:one directory serverscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:wireless lan controllersscope:eqversion:4.2.176.0

Trust: 0.3

vendor:redhatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:unified contact center enterprise icm7.1 es46scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)26

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.25

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10009.3.1

Trust: 0.3

vendor:bluemodel:coat systems directorscope:eqversion:5.2.2.5

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)11

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:3.0.2

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11-b03scope: - version: -

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.2

Trust: 0.3

vendor:sunmodel:opensolarisscope:eqversion:2009.06

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.2.4

Trust: 0.3

vendor:ciscomodel:css11500 content services switchscope:eqversion:8.10.2.65

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:communication manager sp3scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.7

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.12

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.13

Trust: 0.3

vendor:f5model:big-ip wan optimization modulescope:eqversion:10.0.1

Trust: 0.3

vendor:ciscomodel:security agent for ipcc hostedscope:eqversion:4.5.1.639

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1.1

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111ascope: - version: -

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:novellmodel:access manager sp2scope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:windows vista home premium sp1scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.24

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:sdk for javascope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:21.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 0.3

vendor:microsoftmodel:windows vista home premium 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.0

Trust: 0.3

vendor:f5model:wanjetscope:eqversion:4.2.8

Trust: 0.3

vendor:hpmodel:systems insight manager sp3scope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.13

Trust: 0.3

vendor:microsoftmodel:windows terminal services sp3scope:eqversion:2000

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.5.2

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:eqversion:100000

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.3-1

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.2

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:5.2.178.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1 betascope:eqversion:20031

Trust: 0.3

vendor:microsoftmodel:windows server sp2 betascope:eqversion:2008

Trust: 0.3

vendor:ciscomodel:unified communication manager business editionscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.0.x

Trust: 0.3

vendor:rpathmodel:appliance platform linux servicescope:eqversion:2

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:nx-os 4.0 n2scope: - version: -

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.3

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp4scope:eqversion:2000

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:microsoftmodel:windows xp professional edition sp3scope:eqversion:x64

Trust: 0.3

vendor:openvpnmodel:2.1-rc9scope: - version: -

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34009.2.3

Trust: 0.3

vendor:f5model:firepassscope:eqversion:3.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10009.2.3

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.3

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.04

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:openvpnmodel:beta11scope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:telepresence recording serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows vista home premiumscope: - version: -

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.2.3

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:susemodel:moblinscope:eqversion:2.0

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.2

Trust: 0.3

vendor:sunmodel:java system web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 122scope: - version: -

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:ciscomodel:wireless lan control mscope:eqversion:4.2

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.38

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.42.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 109scope: - version: -

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1(4)

Trust: 0.3

vendor:oraclemodel:weblogic server sp7scope:eqversion:7.0

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.3.4

Trust: 0.3

vendor:ciscomodel:csm 4.2.3ascope: - version: -

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.11

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:4.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.3

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.04

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:7960

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp1scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2)16

Trust: 0.3

vendor:bsdperimetermodel:pfsense 1.2-rc3scope: - version: -

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:novellmodel:access manager sp1scope:eqversion:3.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.42.7

Trust: 0.3

vendor:microsoftmodel:windows terminal servicesscope:eqversion:2000

Trust: 0.3

vendor:susemodel:linux enterprise java sp1scope:eqversion:11

Trust: 0.3

vendor:sunmodel:jre 1.5.0 08scope: - version: -

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:6.0

Trust: 0.3

vendor:bluemodel:coat systems proxysg 8100-cscope:eqversion:0

Trust: 0.3

vendor:linksysmodel:etherfast befw11s4 wireless ap cable/dsl routerscope:eqversion:+1.40.3

Trust: 0.3

vendor:hpmodel:systems insight managerscope:neversion:6.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 38scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager sr2bscope:eqversion:4.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.15

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)10

Trust: 0.3

vendor:avayamodel:meeting exchange recording serverscope:eqversion:-0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.2

Trust: 0.3

vendor:bsdperimetermodel:pfsensescope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(2)

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:5

Trust: 0.3

vendor:balabitmodel:syslog-ng premium editionscope:eqversion:3.0.5

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:neversion:3.7.3.7

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.639

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.3.2.11

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:6.7

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp2scope:eqversion:2003

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.3

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16009.2.5

Trust: 0.3

vendor:avayamodel:intuity audix lx sp1scope:eqversion:2.0

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.3.3

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.0.100.0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.3.3.0

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16009.4.5

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.1.79

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:7

Trust: 0.3

vendor:ciscomodel:unified ip phone 7906gscope: - version: -

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.3.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.18

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2(8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)24

Trust: 0.3

vendor:sunmodel:opensolaris build snv 58scope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:4.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.7.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.3

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:neversion:6.2.2

Trust: 0.3

vendor:ciscomodel:application velocity system 3180ascope: - version: -

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3.728

Trust: 0.3

vendor:ciscomodel:unified ip phone sccpscope:eqversion:3.3(15)

Trust: 0.3

vendor:ciscomodel:ip communicatorscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:6.7

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.4

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:2.0.4

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.5

Trust: 0.3

vendor:microsoftmodel:windows server terminal servicesscope:eqversion:20030

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:83

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003

Trust: 0.3

vendor:freebsdmodel:7.0-release-p11scope: - version: -

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:microsoftmodel:windows vista home premium 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 4.1 n2scope:neversion: -

Trust: 0.3

vendor:arubanetworksmodel:arubaos 2.4.8.0-fipsscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)16

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:neversion:7.5.1

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.42.7

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.4

Trust: 0.3

vendor:ciscomodel:application networking managerscope:eqversion:1.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101scope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.5

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.6.5

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(2)17

Trust: 0.3

vendor:proftpdmodel:project proftpd 1.3.2cscope:neversion: -

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.659

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.04

Trust: 0.3

vendor:ciscomodel:fwsm for cisco catalyst seriesscope:eqversion:6500/76001.1(3.17)

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:9.4

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.2.2

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.21

Trust: 0.3

vendor:ciscomodel:access control serverscope:eqversion:0

Trust: 0.3

vendor:zeusmodel:web server r1scope:eqversion:4.1

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:unified ip phone sccpscope:eqversion:3.2(17)

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:6.4-release-p5scope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless lan controllersscope:eqversion:4.2.112.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.14

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0

Trust: 0.3

vendor:oraclemodel:weblogic server mp2scope:eqversion:10.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:4.3.3

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:8

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:5.2.4.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 54scope: - version: -

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.3.2.18

Trust: 0.3

vendor:sunmodel:opensolaris build snv 93scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp2scope:eqversion:2003x64

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.5

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.4

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.8

Trust: 0.3

vendor:sunmodel:java system application server enterprise editionscope:eqversion:8.2

Trust: 0.3

vendor:linksysmodel:etherfast befsr81 routerscope:eqversion:2.42.7

Trust: 0.3

vendor:ciscomodel:network analysis module 4.1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ace appliancescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:sunmodel:jdk 01scope:eqversion:1.6

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)70

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:3.1

Trust: 0.3

vendor:oraclemodel:fusion middlewarescope:eqversion:11.1.1.4.0

Trust: 0.3

vendor:sunmodel:java system web server pluginscope:eqversion:7.00

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.64

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.8

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit editionscope: - version: -

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.5

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:eqversion:0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:sunmodel:java system web server sp7scope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:css11500 content services switchscope:eqversion:7.4

Trust: 0.3

vendor:matrixsslmodel:matrixsslscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3.7

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.13

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:java se sr10scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0.188.0

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.0

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:microsoftmodel:windows server sp4scope:eqversion:2000

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.7.1

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.17

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.4

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.2.3

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:5.5

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:sunmodel:opensolaris build snv 128scope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.6.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 107scope: - version: -

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:db2 universal databasescope:eqversion:9.7.1

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55008.0(5.6)

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.96

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2(5)

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)2

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.4

Trust: 0.3

vendor:sunmodel:java system directory server 2005q4scope:eqversion:5.2

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.40.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.5.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:java system application serverscope:eqversion:8.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 108scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.2.207.0

Trust: 0.3

vendor:ciscomodel:ons t31 omds metro wdm systemscope:eqversion:15531

Trust: 0.3

vendor:balabitmodel:syslog-ng premium editionscope:eqversion:3.2

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.3.1

Trust: 0.3

vendor:hitachimodel:developer's kit for javascope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.50

Trust: 0.3

vendor:ciscomodel:unified ip phone 7960gscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 39scope: - version: -

Trust: 0.3

vendor:sunmodel:java system application server platform editionscope:eqversion:8.0

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:5.2.2.5

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15009.3

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:6.3

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systems r2scope:eqversion:2008

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.1.5

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.4.8

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 90scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 68scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:4.3

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systemsscope:eqversion:20080

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.3

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2(6)

Trust: 0.3

vendor:hpmodel:systems insight manager sp5scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:5.1(3)

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.1

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchangescope:eqversion:5.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.4

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.1

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.3.4

Trust: 0.3

vendor:avayamodel:meeting exchange client registration serverscope:eqversion:-0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:ciscomodel:ace modulescope:eqversion:0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 61scope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befw11s4 wireless ap cable/dsl routerscope:eqversion:+1.37.2

Trust: 0.3

vendor:susemodel:linux enterprise debuginfoscope:eqversion:11

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.2.12

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:9.4

Trust: 0.3

vendor:ciscomodel:unity connectionscope:neversion:8.0(1)

Trust: 0.3

vendor:voodoomodel:circlescope:eqversion:1.1

Trust: 0.3

vendor:sunmodel:java system web server sp11scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.5.4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 41scope: - version: -

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.2.5

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:6.2

Trust: 0.3

vendor:freebsdmodel:7.2-release-p4scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:7

Trust: 0.3

vendor:f5model:firepassscope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:7.0-release-p8scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.1

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.3.2

Trust: 0.3

vendor:ibmmodel:os/400 v6r1m0scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.0(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5.2)

Trust: 0.3

vendor:sunmodel:java system directory server enterprise editionscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2(7)

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15009.2.5

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:65004.0(9)

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34009.3.1

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12

Trust: 0.3

vendor:ciscomodel:css11500 content services switchscope:eqversion:7.50.3.45

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system directory server patch2scope:eqversion:5.2

Trust: 0.3

vendor:microsoftmodel:windows server sp3scope:eqversion:2000

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.14

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.6.3

Trust: 0.3

vendor:bluemodel:coat systems directorscope:eqversion:0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:neversion:7.5.1

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.19

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp2scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:5.1(2)

Trust: 0.3

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su1scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web proxy serverscope:neversion:4.0.13

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:sunmodel:java system directory server enterprise editionscope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:unified ip phonesscope:neversion:9.0.2

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.5

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.40.2

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.6.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java enterprise systemscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:openvpnmodel:2.1-rc8scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.9

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:6.0

Trust: 0.3

vendor:turbolinuxmodel:fujiscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.55)

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.4

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.39

Trust: 0.3

vendor:freebsdmodel:7.2-stablescope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0.182.0

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope:eqversion:11052.0

Trust: 0.3

vendor:ciscomodel:ace web application firewallscope:eqversion:0

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phone sccp 8.2 sr2scope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.1

Trust: 0.3

vendor:microsoftmodel:windows vista edition sp2scope:eqversion:x64

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:4.1.4

Trust: 0.3

vendor:redhatmodel:enterprise linux for sap serverscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:8

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:zeusmodel:web server r2scope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.81)

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:avayamodel:aura communication managerscope:neversion:6.0.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16009.4.6

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.3.2.17

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:6.1.0.103

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.42.7

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows vista betascope:eqversion:2

Trust: 0.3

vendor:ciscomodel:unified intelligent contact management enterprisescope:neversion:7.5(8)

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(6.7)

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.3

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:4.2.6.1

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:neversion:3.8.1

Trust: 0.3

vendor:ciscomodel:unified communications manager 4.3 sr1bscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.1 sr7scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:voodoomodel:circlescope:eqversion:1.1.35

Trust: 0.3

vendor:freebsdmodel:-release-p6scope:eqversion:6.3

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.5

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.1

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:wide area application services 4.1.1bscope: - version: -

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.2

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)28

Trust: 0.3

vendor:sunmodel:jdk 07scope:eqversion:1.5

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.2.4

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.1

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.1.91.0

Trust: 0.3

vendor:novellmodel:access managerscope:eqversion:3.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.3

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3.9

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:7935

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:neversion:6.1.0.31

Trust: 0.3

vendor:ciscomodel:nx-osscope:neversion:4.2(3)

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003x64

Trust: 0.3

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11500 content services switchscope:eqversion:7.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.10

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2(4)

Trust: 0.3

vendor:sunmodel:opensolaris build snv 83scope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 106scope: - version: -

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 125scope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:11x64

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.23

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2003

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:freebsdmodel:7.0-release-p3scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.0.1

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.8.3

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1scope:eqversion:2003

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:freebsdmodel:6.4-release-p4scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(1)5

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.8

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.52

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:1.4.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:3.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.21

Trust: 0.3

vendor:avayamodel:communication manager sp1scope:eqversion:4.0.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.9

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15009.2.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.2.5

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.15

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.6.1

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems r2scope:eqversion:2008

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.0.1

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.1.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.9

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:7.x

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:security agent for icmscope:eqversion:4.5.1.616

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:sunmodel:opensolaris build snv 57scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp2scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(8)1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(8.6)

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)15

Trust: 0.3

vendor:bsdperimetermodel:pfsensescope:neversion:1.2.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.2

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.13

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.41

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(6.33)

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2(3)

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.53

Trust: 0.3

vendor:sunmodel:java system directory server patch4scope:eqversion:5.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel asscope:eqversion:41.0

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1.1

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:ibmmodel:db2 universal databasescope:neversion:9.7.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.6

Trust: 0.3

vendor:proftpdmodel:project proftpdscope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.19

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.8

Trust: 0.3

vendor:sunmodel:glassfish enterprise serverscope:eqversion:2.1.1

Trust: 0.3

vendor:microsoftmodel:windows vista ultimatescope: - version: -

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3.8

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:76004.1(1)

Trust: 0.3

vendor:apachemodel:apachescope:neversion:2.2.15

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:6.0.196.0

Trust: 0.3

vendor:ciscomodel:unified callmanager 5.0scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.01

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.5.3

Trust: 0.3

vendor:ciscomodel:unified callmanager 5.0 su1scope: - version: -

Trust: 0.3

vendor:bluemodel:coat systems directorscope:eqversion:4.2.2.4

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16009.1.1

Trust: 0.3

vendor:ciscomodel:csm 4.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.1 sr8scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)23

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:bluemodel:coat systems blue coat reporterscope:eqversion:8.3.7.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55008.1(2.39)

Trust: 0.3

vendor:redhatmodel:enterprise virtualization hypervisorscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.4

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befvp41 routerscope:eqversion:1.39.64

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.8

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.12

Trust: 0.3

vendor:sunmodel:opensolaris build snv 102scope: - version: -

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:unified callmanager sr5bscope:eqversion:4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.23

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.4.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.0.1

Trust: 0.3

vendor:balabitmodel:syslog-ng premium editionscope:eqversion:3.0.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.31

Trust: 0.3

vendor:ciscomodel:security agent for callmanagerscope:eqversion:4.5.1.639

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.1

Trust: 0.3

vendor:arubanetworksmodel:arubaos rnscope:eqversion:3.1.0.0

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:20080

Trust: 0.3

vendor:ibmmodel:java sdk sr13-fp2scope:eqversion:1.4.2

Trust: 0.3

vendor:microsoftmodel:windows professional sp1scope:eqversion:2000

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 56scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)10

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.11

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:76003.1(17)

Trust: 0.3

vendor:zeusmodel:web server ascope:eqversion:3.3.5

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.6

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:5.2.193.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)22

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:java se sr5scope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.4

Trust: 0.3

vendor:linksysmodel:etherfast befsr81 routerscope:eqversion:2.44

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.36

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.12

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.2.7

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.17

Trust: 0.3

vendor:proftpdmodel:project proftpd 1.3.2ascope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.20

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope:eqversion:2.13

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:ciscomodel:ironport email security appliance x-seriesscope:neversion:7.0.1

Trust: 0.3

vendor:ciscomodel:ace gss series global site selectorscope:eqversion:44000

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:7940

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.2.62.0

Trust: 0.3

vendor:oraclemodel:oracle11g standard editionscope:eqversion:11.2.0.1.0

Trust: 0.3

vendor:proftpdmodel:project proftpd .0rc2scope:eqversion:1.3

Trust: 0.3

vendor:emcmodel:rsa data protection manager applicancescope:eqversion:3.2.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 117scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(1)4

Trust: 0.3

vendor:bluemodel:coat systems directorscope:neversion:5.5.2.3

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.40.2

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:10.0.1

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:65004.1(1)

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0

Trust: 0.3

vendor:voodoomodel:circlescope:eqversion:1.1.36

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.0.1

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)5

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.7

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.61

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:bsdperimetermodel:pfsensescope:eqversion:1.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:6.7

Trust: 0.3

vendor:ciscomodel:spam & virus blocker b-seriesscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:susemodel:linux enterprisescope:eqversion:11

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.4.6

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for novell groupwisescope:eqversion:4.1.7

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node supplementaryscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(1)1

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:8

Trust: 0.3

vendor:linksysmodel:etherfast befw11s4 wireless ap cable/dsl routerscope:eqversion:+1.42.7

Trust: 0.3

vendor:ciscomodel:ciscoworks wireless lan solution enginescope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp2scope:eqversion:2008

Trust: 0.3

vendor:sunmodel:java system directory server patch3scope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.2

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003x64

Trust: 0.3

vendor:sunmodel:opensolaris build snv 13scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(1)

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(1)

Trust: 0.3

vendor:bluemodel:coat systems blue coat reporterscope:eqversion:8.3.3.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.1

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.2.176.51

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:3

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 47scope: - version: -

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 64scope: - version: -

Trust: 0.3

vendor:proftpdmodel:project proftpd .0rc1scope:eqversion:1.3

Trust: 0.3

vendor:ciscomodel:application velocity systemscope:eqversion:31205.0

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:3

Trust: 0.3

vendor:ciscomodel:unified communications manager sr3scope:eqversion:4.2

Trust: 0.3

vendor:sunmodel:jdk 0 03scope:eqversion:1.5

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:ciscomodel:wireless control system for windowsscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:ucosminexus portal frameworkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(7)16

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.62

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.9

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:3.0x64

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.1-1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.3

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:eqversion:6.2.1

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.3.5

Trust: 0.3

vendor:microsoftmodel:windows vista home premium 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4.28)

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:4.x

Trust: 0.3

vendor:microsoftmodel:windows xp embedded sp2scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:eqversion:8.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.2 sr1scope: - version: -

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:8

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.3 sr1ascope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4.3

Trust: 0.3

vendor:openvpnmodel:2.1-beta14scope: - version: -

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.0

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp9scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:meeting exchange streaming serverscope:eqversion:-0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.10

Trust: 0.3

vendor:ciscomodel:unified contact center hostedscope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems blue coat reporterscope:neversion:9.2.4.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:bsdperimetermodel:pfsense 1.2-rc4scope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope:eqversion:11052.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:susemodel:linux enterprise sp2 debuginfoscope:eqversion:10

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16000

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:balabitmodel:syslog-ng premium editionscope:eqversion:3.0.6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 121scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.23

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2.3)

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.6.6

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.7.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 0.3

vendor:sunmodel:java system web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:db2 universal databasescope:eqversion:9.7

Trust: 0.3

vendor:oraclemodel:oracle11g standard editionscope:eqversion:11.2.0.2.0

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchangescope:eqversion:5.0.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.6.4

Trust: 0.3

vendor:balabitmodel:syslog-ng premium edition 3.2.1ascope: - version: -

Trust: 0.3

vendor:sunmodel:sdk 01scope:eqversion:1.4.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.4

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.2

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:6.x

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2.2

Trust: 0.3

vendor:voodoomodel:circlescope:eqversion:1.1.34

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus server web editionscope:eqversion:4

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.3

Trust: 0.3

vendor:zeusmodel:web server 4.3r5scope:neversion: -

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.3

Trust: 0.3

vendor:redhatmodel:jboss enterprise web serverscope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)9

Trust: 0.3

vendor:sunmodel:opensolaris build snv 124scope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:4.2

Trust: 0.3

vendor:ibmmodel:java sdk sr3scope:eqversion:1.4.2

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp1scope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:unified ip phone 7940gscope: - version: -

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:2.5.6.24

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:3.4.1.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:9.2.5

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.13

Trust: 0.3

vendor:linksysmodel:etherfast befw11s4 wireless ap cable/dsl router bscope:eqversion:+1.37.9

Trust: 0.3

vendor:sunmodel:opensolaris build snv 85scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 19scope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel serverscope:eqversion:51.0

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.7

Trust: 0.3

vendor:susemodel:linux enterprise sp3 debuginfoscope:eqversion:10

Trust: 0.3

vendor:ciscomodel:wireless location appliancescope:eqversion:0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.8

Trust: 0.3

vendor:oraclemodel:weblogic server sp6scope:eqversion:8.1

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.5

Trust: 0.3

vendor:sunmodel:java system web server updatescope:eqversion:7.03

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2.7

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.4

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:5.1

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.44

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:4

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.1

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.2.205.0

Trust: 0.3

vendor:microsoftmodel:windows for itanium-based systemsscope:eqversion:70

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ibmmodel:db2 universal databasescope:eqversion:9.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.1.11

Trust: 0.3

vendor:microsoftmodel:windows xp goldscope:eqversion:0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)6

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:db2 universal database fix packscope:eqversion:9.18

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.2.6

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp2scope:eqversion:2000

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.7

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.2

Trust: 0.3

vendor:sunmodel:java system web server updatescope:neversion:7.07

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0scope: - version: -

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:6.0(1.126)

Trust: 0.3

vendor:freebsdmodel:6.3-release-p11scope: - version: -

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition 2005q1rhel2.1/rhel3scope:eqversion:8.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 74scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.7.2

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager patchscope:eqversion:8.23

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:7

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.3 sr1scope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:1.6.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)71

Trust: 0.3

vendor:ciscomodel:ironport web security management appliance m-seriesscope:eqversion:0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111bscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:5.0.1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.8.1

Trust: 0.3

vendor:zeusmodel:web server r5scope:eqversion:4.1

Trust: 0.3

vendor:microsoftmodel:windows vista sp2scope: - version: -

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.2

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 29scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:7

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:8.8(0)

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.0.8

Trust: 0.3

vendor:freebsdmodel:7.1-release-p5scope: - version: -

Trust: 0.3

vendor:ciscomodel:video surveillance media server softwarescope:neversion:4.2.1

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.8.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:neversion:4.1.7

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope:eqversion:11052.0.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.3

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.1

Trust: 0.3

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 0.3

vendor:vmwaremodel:esx server esx410-201101201scope:neversion:4.1

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp3scope: - version: -

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(4)

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus server standard editionscope:eqversion:4

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:eqversion:17000

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.4.8

Trust: 0.3

vendor:matrixsslmodel:matrixsslscope:eqversion:1.8.7

Trust: 0.3

vendor:emcmodel:rsa data protection manager appliancescope:neversion:3.2.4.2

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp2scope:eqversion:2003x64

Trust: 0.3

vendor:ciscomodel:security agent for icmscope:eqversion:4.5.1.639

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:sunmodel:java system web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:9.4.8

Trust: 0.3

vendor:sunmodel:opensolaris build snv 105scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0.0.96

Trust: 0.3

vendor:ciscomodel:unified communications manager 6.1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center editionscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:freebsdmodel:-pre-releasescope:eqversion:7.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2003x64

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.4

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:3.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:sunmodel:java system web proxy serverscope:eqversion:4.0.12

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.2

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.8.1

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:4.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:1.5.0

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(3)

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:0

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:16.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.44

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.02

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:neversion:5.0

Trust: 0.3

vendor:sunmodel:java system web server sp8scope:eqversion:6.1

Trust: 0.3

vendor:microsoftmodel:windows vista home premium sp2scope: - version: -

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.8.2

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.18

Trust: 0.3

vendor:sunmodel:java system directory server enterprise editionscope:eqversion:6.2

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16009.3

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:3.x

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.3

Trust: 0.3

vendor:microsoftmodel:windows xp embeddedscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise sp1scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:cosminexus application server standardscope:eqversion:6

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.16

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8gscope: - version: -

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:5.2.6

Trust: 0.3

vendor:oraclemodel:identity managementscope:eqversion:10.1.4.3

Trust: 0.3

vendor:ibmmodel:os/400 v6r1m1scope: - version: -

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.6

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.3

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:ibmmodel:os/400 v5r4m5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-release-p9scope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0.95

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.4.3

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.0

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10009.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2scope:eqversion:2008

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:0

Trust: 0.3

vendor:sunmodel:java system web server sp10scope:eqversion:6.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:ibmmodel:db2 universal database fix packscope:eqversion:9.17

Trust: 0.3

vendor:ciscomodel:ons seriesscope:eqversion:155000

Trust: 0.3

vendor:ciscomodel:application velocity systemscope:eqversion:31205.0.1

Trust: 0.3

vendor:microsoftmodel:windows vista business sp1scope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless lan control mscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.17

Trust: 0.3

vendor:avayamodel:cvlanscope: - version: -

Trust: 0.3

vendor:ciscomodel:ironport email security appliance c-seriesscope:eqversion:0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:microsoftmodel:windows professional sp2scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:freebsdmodel:-release-p1scope:eqversion:7.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:microsoftmodel:windows terminal services sp4scope:eqversion:2000

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:ciscomodel:ironport email security appliance c-seriesscope:neversion:7.0.1

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:1.4.2

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:3.0.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.6

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:7.1-release-p6scope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for javascope:eqversion:5.0

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.6

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.04

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise sp1scope: - version: -

Trust: 0.3

vendor:proftpdmodel:project proftpd rc3scope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.2

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:2

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.5

Trust: 0.3

vendor:ciscomodel:video surveillance media server softwarescope:eqversion:0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:java se sr11scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:freebsdmodel:6.4-release-p2scope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.1.10

Trust: 0.3

vendor:sunmodel:one directory server patchscope:eqversion:5.23

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10009.4.5

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:4.1

Trust: 0.3

vendor:citrixmodel:secure gatewayscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4.18)

Trust: 0.3

vendor:hpmodel:systems insight managerscope:neversion:7.0

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.4

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.02

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.6

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.52

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:3

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc editionscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:70

Trust: 0.3

vendor:citrixmodel:secure gatewayscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:java se sr11 pf1scope:neversion:5.0

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.8

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(2)

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10009.1.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.5

Trust: 0.3

vendor:proftpdmodel:project proftpdscope:eqversion:1.3.1

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:76003.2(15)

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15009.3.1

Trust: 0.3

vendor:ciscomodel:unified ip phone 7941gscope: - version: -

Trust: 0.3

vendor:proftpdmodel:project proftpd rc2scope:eqversion:1.3.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)25

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:neversion:5.5.17

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:neversion:8.0(0.98000.106)

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.6

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.35

Trust: 0.3

vendor:sunmodel:java system application server enterprise editionscope:eqversion:8.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.4

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:6.7

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:sunmodel:java system directory server enterprise editionscope:eqversion:5

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:4.2.8.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise server debuginfoscope:eqversion:11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0.2

Trust: 0.3

vendor:bluemodel:coat systems proxysg 200-cscope:eqversion:0

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.3.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 110scope: - version: -

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 71scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.8

Trust: 0.3

vendor:ibmmodel:db2 universal database fix pack 6ascope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:cosminexus studio standard editionscope:eqversion:4

Trust: 0.3

vendor:microsoftmodel:windows server itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.1

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:20080

Trust: 0.3

vendor:hitachimodel:ibm xl c/c++ enterprise edition for aix & hitachi developer'sscope:eqversion:v801-00

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0.96

Trust: 0.3

vendor:ciscomodel:ironport web security appliance s-seriesscope:eqversion:0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:oraclemodel:identity managementscope:eqversion:10.1.4.0.1

Trust: 0.3

vendor:ciscomodel:onsscope:eqversion:15530

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:neversion:3.7.1.12

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:unified contact center hosted icm7.1 es46scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)2

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:4.0

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.2

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:video surveillance media server softwarescope:neversion:6.2.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.1.1

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.11

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.4.1.0

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:eqversion:7.2(3)

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.8

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:f5model:arxscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java system application serverscope:eqversion:8.1

Trust: 0.3

vendor:microsoftmodel:windows xp embedded sp3scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.60

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:6.0-relengscope: - version: -

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.0

Trust: 0.3

vendor:susemodel:linux enterprise teradata sp3scope:eqversion:10

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.2.77

Trust: 0.3

vendor:sunmodel:jdk 0 09scope:eqversion:1.5

Trust: 0.3

vendor:ciscomodel:security agent for ipcc enterprisescope:eqversion:4.5.1.616

Trust: 0.3

vendor:sunmodel:opensolaris build snv 80scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.0

Trust: 0.3

vendor:avayamodel:communication manager sp2scope:eqversion:3.1.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 104scope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope:eqversion:11302.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.4

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows xp professionalscope: - version: -

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:4.2.1.6

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.50

Trust: 0.3

vendor:sunmodel:java system web proxy serverscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:eqversion:7.1(5)

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.29

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:3.5.9

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.1

Trust: 0.3

vendor:microsoftmodel:windows home premiumscope:eqversion:70

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:3.3

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.4

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for novell groupwisescope:eqversion:4.1.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:microsoftmodel:windows vista sp1scope: - version: -

Trust: 0.3

vendor:ciscomodel:application velocity systemscope:eqversion:3180

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:susemodel:linux enterprise java sp3scope:eqversion:10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:oraclemodel:application serverscope:eqversion:10.1.3.5.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.22

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.0.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 84scope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.05.00

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.7

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp2scope: - version: -

Trust: 0.3

vendor:hitachimodel:ibm xl c/c++ enterprise edition for aix & hitachi developer'sscope:eqversion:v701-00

Trust: 0.3

vendor:microsoftmodel:windows starterscope:eqversion:70

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.6

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.14

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.44

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)14

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.7

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.11

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 12scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista home basic sp2scope: - version: -

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:76004.0(9)

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:16009.2.3

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:bsdperimetermodel:pfsense 1.2-rc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.4

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:4.0

Trust: 0.3

vendor:f5model:big-ip wan optimization modulescope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:jdk 1.6.0 01-b06scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:ciscomodel:network analysis module patchscope:eqversion:3.12

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15009.1.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ciscomodel:ace appliance a3scope:eqversion:4710

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.6

Trust: 0.3

vendor:arubanetworksmodel:arubaos rnscope:eqversion:3.1.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:avayamodel:meeting exchange webportalscope:eqversion:-6.0

Trust: 0.3

vendor:ciscomodel:unified ip phonesscope:neversion:9.0.3

Trust: 0.3

vendor:ciscomodel:css11500 content services switchscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.601

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp11scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.47

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server el4scope:eqversion:0

Trust: 0.3

vendor:sunmodel:one directory server patchscope:eqversion:5.24

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate sp1scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.6

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:sdk for javascope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:70

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:4.2.10

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.27

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3-1

Trust: 0.3

vendor:microsoftmodel:windows professional sp4scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55007.2(4.44)

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.5

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java system directory server enterprise editionscope:eqversion:6.1

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise sp2scope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.12

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp2scope: - version: -

Trust: 0.3

vendor:ciscomodel:application networking manager update ascope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:6.7

Trust: 0.3

vendor:sunmodel:java system directory server 2004q2scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:neversion:4.2.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:6.0

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:ons t31 omds metro wdm systemscope:eqversion:15532

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for dominoscope:eqversion:4.1.4

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.19

Trust: 0.3

vendor:sunmodel:opensolaris build snv 116scope: - version: -

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for dominoscope:eqversion:5.0.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:freebsdmodel:6.4-relengscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server r2 datacenterscope:eqversion:20080

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.8

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:-release-p2scope:eqversion:7.1

Trust: 0.3

vendor:hpmodel:virtual connect 8gb 24-port fc modulescope:neversion:3.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)78

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.45.7

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8fscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.6

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.2

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.1

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:microsoftmodel:windows vista home basicscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4)7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)74

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.7

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:hpmodel:virtual connect 8gb 24-port fc modulescope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchangescope:eqversion:4.1.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 99scope: - version: -

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:15.0

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.1 sr5scope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0.2

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:15009.4.5

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.79)

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:5.0.2

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.3.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:hitachimodel:cosminexus studio web editionscope:eqversion:4

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:3.3.3.2

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.36

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:neversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:ace appliancescope:eqversion:47100

Trust: 0.3

vendor:sunmodel:opensolaris build snv 49scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.25

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:csmscope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(8)6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:bluemodel:coat systems blue coat reporterscope:eqversion:9.1.5.1

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp4scope:eqversion:2000

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchange mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.13

Trust: 0.3

vendor:microsoftmodel:windows vista edition sp1scope:eqversion:x64

Trust: 0.3

vendor:ibmmodel:http serverscope:neversion:7.0.4.27

Trust: 0.3

vendor:ciscomodel:unified ip phone 8.0 sr2scope: - version: -

Trust: 0.3

vendor:zeusmodel:web server r2scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:unified ip phone 8.0 sr1scope: - version: -

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:1.4.2

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:fwsm for cisco catalyst seriesscope:eqversion:6500/76002.3.1

Trust: 0.3

vendor:oraclemodel:oracle11g enterprise editionscope:eqversion:11.2.0.1.0

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.41

Trust: 0.3

vendor:zeusmodel:web server r4scope:eqversion:4.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:9.2.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 78scope: - version: -

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.5

Trust: 0.3

vendor:ciscomodel:security agent for cvpscope:eqversion:3.14.5.1.639

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp2scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:unified callmanager sr5cscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope:eqversion:11302.0.5

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windows terminal services sp1scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:unified callmanager 3.3 sr2bscope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.7.7

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2scope:eqversion:2003

Trust: 0.3

vendor:freebsdmodel:6.3-release-p10scope: - version: -

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.2.13

Trust: 0.3

vendor:sunmodel:java system directory server 2003q4scope:eqversion:5.2

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.1-1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp2scope:eqversion:2008

Trust: 0.3

vendor:avayamodel:message networking mnscope:eqversion:3.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:6

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.04

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q4scope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:java system directory server 2005q1scope:eqversion:5.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 120scope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:neversion:3.2.1

Trust: 0.3

vendor:ibmmodel:tivoli endpoint managerscope:neversion:8.2.1310

Trust: 0.3

vendor:voodoomodel:circlescope:eqversion:1.1.37

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.2

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit edition version sp1scope:eqversion:2003

Trust: 0.3

vendor:ibmmodel:java se sr6scope:eqversion:6.0

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for domino mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(8)3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:1.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.8

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:freebsdmodel:7.1-release-p4scope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.43.3

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10000

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.6

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:3.6.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.11

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003x64

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:video surveillance operations manager softwarescope:eqversion:0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.27

Trust: 0.3

vendor:hitachimodel:cosminexus application server standardscope:eqversion:6.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:network collectorscope:neversion:6.1

Trust: 0.3

vendor:openofficemodel:betascope:eqversion:2.0

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.4.8

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.8

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5

Trust: 0.3

vendor:sunmodel:opensolaris build snv 35scope: - version: -

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.5

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:3

Trust: 0.3

vendor:ibmmodel:db2 universal database fix packscope:eqversion:9.16

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.0.95

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp1scope: - version: -

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.6.4

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate sp2scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:neversion:10.50

Trust: 0.3

vendor:avayamodel:intuity audix lx sp2scope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.34

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.31

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)27

Trust: 0.3

vendor:oraclemodel:oracle11g enterprise editionscope:eqversion:11.1.0.7

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)006

Trust: 0.3

vendor:microsoftmodel:windows ultimatescope:eqversion:70

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller modulescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:db2 universal database fix packscope:neversion:9.19

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1scope:eqversion:2003

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:3.0

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.1

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:unified callmanager 4.1 sr4scope: - version: -

Trust: 0.3

vendor:f5model:bigip samscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(1)13

Trust: 0.3

vendor:balabitmodel:syslog-ng premium edition 3.2.1bscope:neversion: -

Trust: 0.3

vendor:oraclemodel:oracle11g standard editionscope:eqversion:11.1.7

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:0

Trust: 0.3

vendor:linksysmodel:etherfast befsr81 routerscope: - version: -

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.2.5

Trust: 0.3

vendor:ciscomodel:mobile wireless transport managerscope:neversion:6.1(2)

Trust: 0.3

vendor:hpmodel:systems insight manager c.05.00.02scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:1.4.3

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34000

Trust: 0.3

vendor:bluemodel:coat systems directorscope:eqversion:5.5

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 59scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp3scope:eqversion:2000

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.1

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.37

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.4

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:2.1(4)

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp3scope:eqversion:2000

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:9.4.8

Trust: 0.3

vendor:oraclemodel:oracle11g enterprise editionscope:eqversion:11.2.0.2.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.13

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.10

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1 betascope:eqversion:20031

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:f5model:firepassscope: - version: -

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:onsscope:eqversion:15540

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.3

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:6

Trust: 0.3

vendor:gnumodel:gnutlsscope:eqversion:2.4.1

Trust: 0.3

vendor:balabitmodel:syslog-ng premium edition 3.0.7ascope:neversion: -

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.3.2

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(1)2

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:6.4

Trust: 0.3

vendor:sunmodel:java system web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09scope: - version: -

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:10.0.1

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.7

Trust: 0.3

vendor:vmwaremodel:vcenter updatescope:neversion:4.11

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.3

Trust: 0.3

vendor:sunmodel:opensolarisscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:windows xp homescope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.43.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.10

Trust: 0.3

vendor:microsoftmodel:windows server web editionscope:eqversion:2003

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:security agent for ipcc enterprisescope:eqversion:4.5.1.639

Trust: 0.3

vendor:oraclemodel:application serverscope:eqversion:10.1.2.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 94scope: - version: -

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.3

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.2

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:9.3

Trust: 0.3

vendor:microsoftmodel:windows server itaniumscope:eqversion:20030

Trust: 0.3

vendor:arubanetworksmodel:arubaos 3.3.2.14-fipsscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:f5model:wanjetscope:eqversion:5.0.2

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:0

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10009.2.5

Trust: 0.3

vendor:ciscomodel:unified communications manager sr4scope:eqversion:4.2

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:neversion:3.7.2.8

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.4

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.8

Trust: 0.3

vendor:hpmodel:systems insight manager updatescope:eqversion:5.31

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0.0x64

Trust: 0.3

vendor:voodoomodel:circlescope:neversion:1.1.38

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.5

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:6

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.8

Trust: 0.3

vendor:sunmodel:opensolaris build snv 01scope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless control system for linuxscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:8

Trust: 0.3

vendor:ciscomodel:ironport web security appliance s-seriesscope:neversion:6.3.3

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.4

Trust: 0.3

vendor:proftpdmodel:project proftpdscope:eqversion:1.3.2

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:9.4.8

Trust: 0.3

vendor:microsoftmodel:windows vista betascope:eqversion:1

Trust: 0.3

vendor:linksysmodel:etherfast befvp41 routerscope: - version: -

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.7.3

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0.1

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.4

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10009.4.6

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.9

Trust: 0.3

vendor:ibmmodel:java se sr7scope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 76scope: - version: -

Trust: 0.3

vendor:zeusmodel:web server 4.3r4scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional edition sp2scope:eqversion:x64

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.8

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.1.1

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:7.0-releasescope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101ascope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.0.6

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.3.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.8

Trust: 0.3

vendor:sunmodel:opensolaris build snv 87scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.1

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:2.0

Trust: 0.3

vendor:f5model:firepassscope:eqversion:5.5.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 113scope: - version: -

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0.193

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:9.10

Trust: 0.3

vendor:arubanetworksmodel:arubaos 3.3.2.13-fipsscope: - version: -

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.4.2

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:9.4.5

Trust: 0.3

vendor:redhatmodel:enterprise linux as for sapscope:eqversion:4

Trust: 0.3

vendor:microsoftmodel:windows terminal services sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:7.0

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.0.5

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:5

Trust: 0.3

vendor:sunmodel:java system directory server enterprise editionscope:eqversion:6.3.1

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.0.9

Trust: 0.3

vendor:emcmodel:rsa data protection manager appliancescope:neversion:3.5.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 119scope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for novell groupwisescope:eqversion:5.0.1

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.41

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.9

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.12.5

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:ciscomodel:security agent for cvpscope:eqversion:3.14.5.1.573

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.8

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0

Trust: 0.3

vendor:microsoftmodel:windows datacenter serverscope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:unified communications manager 4.2 sr2scope: - version: -

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.47.1

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:5.x

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2)15

Trust: 0.3

vendor:microsoftmodel:windowsscope:eqversion:7

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.5

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.2

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:4.3(2)

Trust: 0.3

vendor:ciscomodel:unified communications manager 4.3 sr1scope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.3

vendor:f5model:wanjetscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4.30)

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:unified ip phone 7961gscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope:eqversion:11302.0.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2)

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.1.3

Trust: 0.3

vendor:ciscomodel:digital media playerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1(2)19

Trust: 0.3

vendor:f5model:arxscope:eqversion:5.0.6

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 02scope: - version: -

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:eqversion:8.3.2

Trust: 0.3

vendor:ciscomodel:css11500 content services switch sscope:eqversion:7.10

Trust: 0.3

vendor:prozillamodel:download accelaratorscope:eqversion:1.2.1

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:6.0(2.099)

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:9.6.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.2

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:eqversion:3.3.26

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:7

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:integrated management suitescope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems blue coat reporterscope:eqversion:9.2.3.1

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.2.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.3

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:unified ip phone 7970gscope: - version: -

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.26

Trust: 0.3

vendor:hpmodel:systems insight manager sp6scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(4.9)

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.3.2

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:11

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.1

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:10.04

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:websphere mq internet pass-thruscope:eqversion:2

Trust: 0.3

vendor:sunmodel:java system directory server 2004q2scope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:7.2-release-p1scope: - version: -

Trust: 0.3

vendor:arubanetworksmodel:arubaosscope:neversion:3.3.2.23

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:9.2.4

Trust: 0.3

vendor:microsoftmodel:windows xpscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.43

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.1

Trust: 0.3

vendor:ciscomodel:ace application control enginescope:eqversion:47000

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 07-b03scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 98scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:2008

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.7

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:security agent for cvpscope:eqversion:3.04.5.1.573

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:freebsdmodel:-release-p10scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.8

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.3.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.11

Trust: 0.3

vendor:ciscomodel:security agent for ipcc hostedscope:eqversion:4.5.1.616

Trust: 0.3

vendor:sunmodel:opensolaris build snv 22scope: - version: -

Trust: 0.3

vendor:hpmodel:matrix operating environmentscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.4

Trust: 0.3

vendor:redhatmodel:enterprise linux sapscope:eqversion:6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 81scope: - version: -

Trust: 0.3

vendor:zeusmodel:web serverscope:eqversion:3.1.5

Trust: 0.3

vendor:sunmodel:opensolaris build snv 103scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp embedded sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2003x64

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.9

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.201

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:unified ip phone 7971gscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista betascope: - version: -

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.0.5

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:5.1(1)

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.0

Trust: 0.3

vendor:bsdperimetermodel:pfsense 1.2-rc2scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.21

Trust: 0.3

vendor:microsoftmodel:windows vista enterprisescope: - version: -

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.5

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.2-2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:unified ip phone sccpscope:eqversion:8.0(8)

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.657

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:65003.1(17)

Trust: 0.3

vendor:ciscomodel:unified communications manager 4.3 sr.1scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:34009.2.5

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.43.3

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(2)

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:ironport encryption appliancescope:eqversion:6.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.5.1

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp1scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 37scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 115scope: - version: -

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:3.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:db2 universal database fix pack 4ascope:eqversion:9.1

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:prozillamodel:download accelaratorscope:eqversion:1.3.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:9.3.1

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:security agent for cvpscope:eqversion:3.04.5.1.639

Trust: 0.3

vendor:avayamodel:intuity audix lxscope:eqversion:2.0

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:65003.2(15)

Trust: 0.3

vendor:ibmmodel:java sdk sr13-fp1scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:java system web server sp6scope:eqversion:6.1

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.2

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1scope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(4)30

Trust: 0.3

vendor:ciscomodel:wireless lan solution enginescope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.7

Trust: 0.3

vendor:ciscomodel:unified contact center hostedscope:eqversion:7.2(3)

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for dominoscope:eqversion:4.1.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 127scope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.6

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:sunmodel:opensolaris build snv 86scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:2000

Trust: 0.3

sources: CERT/CC: VU#120541 // BID: 36935 // JVNDB: JVNDB-2009-002319 // NVD: CVE-2009-3555

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3555
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-3555
value: 0

Trust: 0.8

NVD: CVE-2009-3555
value: MEDIUM

Trust: 0.8

VULHUB: VHN-41001
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-3555
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2009-3555
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-41001
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#120541 // VULHUB: VHN-41001 // JVNDB: JVNDB-2009-002319 // NVD: CVE-2009-3555

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.1

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-41001 // JVNDB: JVNDB-2009-002319 // NVD: CVE-2009-3555

THREAT TYPE

network

Trust: 0.3

sources: BID: 36935

TYPE

arbitrary

Trust: 0.4

sources: PACKETSTORM: 94088 // PACKETSTORM: 82647 // PACKETSTORM: 86075 // PACKETSTORM: 91309

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002319

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-41001

PATCH

title:Changes with Apache 2.2.15url:http://www.apache.org/dist/httpd/CHANGES_2.2.15

Trust: 0.8

title:Changes with Apache 2.3.6url:http://www.apache.org/dist/httpd/CHANGES_2.3.6

Trust: 0.8

title:HT4170url:http://support.apple.com/kb/HT4170

Trust: 0.8

title:HT4418url:http://support.apple.com/kb/HT4418

Trust: 0.8

title:HT4171url:http://support.apple.com/kb/HT4171

Trust: 0.8

title:HT4004url:http://support.apple.com/kb/HT4004

Trust: 0.8

title:HT4417url:http://support.apple.com/kb/HT4417

Trust: 0.8

title:HT4004url:http://support.apple.com/kb/HT4004?viewlocale=ja_JP

Trust: 0.8

title:HT4417url:http://support.apple.com/kb/HT4417?viewlocale=ja_JP

Trust: 0.8

title:HT4170url:http://support.apple.com/kb/HT4170?viewlocale=ja_JP

Trust: 0.8

title:HT4418url:http://support.apple.com/kb/HT4418?viewlocale=ja_JP

Trust: 0.8

title:HT4171url:http://support.apple.com/kb/HT4171?viewlocale=ja_JP

Trust: 0.8

title:openssl097a-0.9.7a-9.AXS3.2url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1011

Trust: 0.8

title:jdk-1.6.0_19url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1028

Trust: 0.8

title:httpd-2.2.3-31.2.1AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=774

Trust: 0.8

title:nss-3.12.6-1.AXS3 and nspr-4.8.4-1.AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1012

Trust: 0.8

title:gnutls-1.4.1-3.8.0.1.AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1013

Trust: 0.8

title:jdk-1.6.0_22url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1285

Trust: 0.8

title:openssl-0.9.8e-12.AXS3.6url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1014

Trust: 0.8

title:609365url:http://search.sybase.com/kbx/changerequests?bug_id=609365

Trust: 0.8

title:cisco-sa-20091109-tlsurl:http://www.cisco.com/warp/public/707/cisco-sa-20091109-tls.shtml

Trust: 0.8

title:cpujul2010.htmlurl:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

Trust: 0.8

title:javacpuoct2010-176258url:http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html

Trust: 0.8

title:cpuapr2011-301950url:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html

Trust: 0.8

title:javacpumar2010url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html

Trust: 0.8

title:HS10-030url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS10-030/index.html

Trust: 0.8

title:HS10-010url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS10-010/index.html

Trust: 0.8

title:HS11-006url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-006/index.html

Trust: 0.8

title:HPSBHF03293url:http://marc.info/?l=bugtraq&amp;m=142660345230545&amp;w=2

Trust: 0.8

title:HPSBUX02517url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02079216

Trust: 0.8

title:HPSBUX02608url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748

Trust: 0.8

title:HPSBUX02498url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01963123

Trust: 0.8

title:HPSBMU02769 SSRT100846url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03298151

Trust: 0.8

title:HPSBUX02482url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686

Trust: 0.8

title:HPSBUX02524url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02122104

Trust: 0.8

title:HPSBMU03611url:https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05150888

Trust: 0.8

title:7007033url:http://www-01.ibm.com/support/docview.wss?uid=swg27007033#60239

Trust: 0.8

title:7014463url:http://www-01.ibm.com/support/docview.wss?uid=swg27014463#7009

Trust: 0.8

title:7006876url:http://www-01.ibm.com/support/docview.wss?uid=swg27006876#60239

Trust: 0.8

title:1426108url:http://www-01.ibm.com/support/docview.wss?uid=swg21426108

Trust: 0.8

title:4909url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4909

Trust: 0.8

title:7007951url:http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27007951#61029

Trust: 0.8

title:4025718url:http://www-01.ibm.com/support/docview.wss?uid=swg24025718

Trust: 0.8

title:7008517url:http://www-01.ibm.com/support/docview.wss?rs=177&uid=swg27008517#61029

Trust: 0.8

title:4025719url:http://www-01.ibm.com/support/docview.wss?uid=swg24025719

Trust: 0.8

title:1444772url:http://www-01.ibm.com/support/docview.wss?uid=swg21444772

Trust: 0.8

title:4025742url:http://www-01.ibm.com/support/docview.wss?uid=swg24025742

Trust: 0.8

title:1412438url:http://www-01.ibm.com/support/docview.wss?uid=swg21412438#2

Trust: 0.8

title:IC68054url:http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054

Trust: 0.8

title:1293566url:http://www-01.ibm.com/support/docview.wss?uid=swg21293566#6a

Trust: 0.8

title:4025746url:http://www-01.ibm.com/support/docview.wss?uid=swg24025746

Trust: 0.8

title:1432298url:http://www-01.ibm.com/support/docview.wss?uid=swg21432298

Trust: 0.8

title:PM10658url:http://www-01.ibm.com/support/docview.wss?uid=swg1PM10658

Trust: 0.8

title:1413714url:http://www-01.ibm.com/support/docview.wss?uid=swg21413714

Trust: 0.8

title:4025312url:http://www-01.ibm.com/support/docview.wss?uid=swg24025312

Trust: 0.8

title:977377url:http://www.microsoft.com/technet/security/advisory/977377.mspx

Trust: 0.8

title:MS10-049url:http://www.microsoft.com/technet/security/bulletin/MS10-049.mspx

Trust: 0.8

title:2043url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2043

Trust: 0.8

title:2046url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2046

Trust: 0.8

title:1819url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1819

Trust: 0.8

title:2047url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2047

Trust: 0.8

title:1820url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1820

Trust: 0.8

title:2048url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2048

Trust: 0.8

title:MFSA 2010-22url:http://www.mozilla.org/security/announce/2010/mfsa2010-22.html

Trust: 0.8

title:MFSA 2010-22url:http://www.mozilla-japan.org/security/announce/2010/mfsa2010-22.html

Trust: 0.8

title:NV10-008url:http://www.nec.co.jp/security-info/secinfo/nv10-008.html

Trust: 0.8

title:CVE-2009-3555url:http://www.openoffice.org/security/cves/CVE-2009-3555.html

Trust: 0.8

title:secadv_20091111url:http://www.openssl.org/news/secadv_20091111.txt

Trust: 0.8

title:RELEASE_NOTES-1.3.2curl:http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c

Trust: 0.8

title:RHSA-2010:0338url:https://rhn.redhat.com/errata/RHSA-2010-0338.html

Trust: 0.8

title:RHSA-2010:0164url:https://rhn.redhat.com/errata/RHSA-2010-0164.html

Trust: 0.8

title:RHSA-2010:0339url:https://rhn.redhat.com/errata/RHSA-2010-0339.html

Trust: 0.8

title:RHSA-2010:0865url:https://rhn.redhat.com/errata/RHSA-2010-0865.html

Trust: 0.8

title:RHSA-2010:0165url:https://rhn.redhat.com/errata/RHSA-2010-0165.html

Trust: 0.8

title:RHSA-2010:0166url:https://rhn.redhat.com/errata/RHSA-2010-0166.html

Trust: 0.8

title:RHSA-2010:0167url:https://rhn.redhat.com/errata/RHSA-2010-0167.html

Trust: 0.8

title:RHSA-2010:0770url:https://rhn.redhat.com/errata/RHSA-2010-0770.html

Trust: 0.8

title:RHSA-2010:0786url:https://rhn.redhat.com/errata/RHSA-2010-0786.html

Trust: 0.8

title:RHSA-2010:0130url:https://rhn.redhat.com/errata/RHSA-2010-0130.html

Trust: 0.8

title:RHSA-2010:0768url:https://rhn.redhat.com/errata/RHSA-2010-0768.html

Trust: 0.8

title:RHSA-2010:0807url:https://rhn.redhat.com/errata/RHSA-2010-0807.html

Trust: 0.8

title:RHSA-2010:0155url:http://rhn.redhat.com/errata/RHSA-2010-0155.html

Trust: 0.8

title:RHSA-2009:1579url:https://rhn.redhat.com/errata/RHSA-2009-1579.html

Trust: 0.8

title:RHSA-2010:0162url:https://rhn.redhat.com/errata/RHSA-2010-0162.html

Trust: 0.8

title:RHSA-2009:1580url:https://rhn.redhat.com/errata/RHSA-2009-1580.html

Trust: 0.8

title:RHSA-2010:0987url:https://rhn.redhat.com/errata/RHSA-2010-0987.html

Trust: 0.8

title:RHSA-2010:0337url:https://rhn.redhat.com/errata/RHSA-2010-0337.html

Trust: 0.8

title:RHSA-2010:0163url:https://rhn.redhat.com/errata/RHSA-2010-0163.html

Trust: 0.8

title:SA44url:https://kb.bluecoat.com/index?page=content&id=SA44

Trust: 0.8

title:multiple_vulnerabilities_in_the_apacheurl:http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_the_apache

Trust: 0.8

title:Multiple Vulnerabilities in the Apache 2 HTTP Server Prior to 2.2.16url:http://blogs.oracle.com/sunsecurity

Trust: 0.8

title:273029url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1

Trust: 0.8

title:273350url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-273350-1

Trust: 0.8

title:274990url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1

Trust: 0.8

title:TLSA-2010-20url:http://www.turbolinux.co.jp/security/2010/TLSA-2010-20j.txt

Trust: 0.8

title:TLSA-2010-42url:http://www.turbolinux.co.jp/security/2010/TLSA-2010-42j.txt

Trust: 0.8

title:TLSA-2009-30url:http://www.turbolinux.co.jp/security/2009/TLSA-2009-30j.txt

Trust: 0.8

title:TLSA-2009-32url:http://www.turbolinux.co.jp/security/2009/TLSA-2009-32j.txt

Trust: 0.8

title:VMSA-2010-0019url:http://www.vmware.com/security/advisories/VMSA-2010-0019.html

Trust: 0.8

title:VMSA-2011-0003url:http://www.vmware.com/security/advisories/VMSA-2011-0003.html

Trust: 0.8

title:100716_91url:http://www.oracle.com/technology/global/jp/security/100716_91/top.html

Trust: 0.8

title:HS10-010url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-010/index.html

Trust: 0.8

title:HS10-030url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030

Trust: 0.8

title:HS11-006url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-006/index.html

Trust: 0.8

title:977377url:http://www.microsoft.com/japan/technet/security/advisory/977377.mspx

Trust: 0.8

title:MS10-049url:http://www.microsoft.com/japan/technet/security/bulletin/ms10-049.mspx

Trust: 0.8

title:MS10-049eurl:http://www.microsoft.com/japan/security/bulletins/MS10-049e.mspx

Trust: 0.8

title:TA10-222Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-222a.html

Trust: 0.8

title:VU#120541url:http://software.fujitsu.com/jp/security/vulnerabilities/vu120541.html

Trust: 0.8

sources: JVNDB: JVNDB-2009-002319

EXTERNAL IDS

db:NVDid:CVE-2009-3555

Trust: 4.3

db:CERT/CCid:VU#120541

Trust: 3.0

db:BIDid:36935

Trust: 2.2

db:SECUNIAid:38020

Trust: 1.9

db:SECUNIAid:39242

Trust: 1.9

db:SECUNIAid:39243

Trust: 1.9

db:SECUNIAid:37453

Trust: 1.9

db:SECUNIAid:40747

Trust: 1.9

db:SECUNIAid:39500

Trust: 1.9

db:SECUNIAid:39136

Trust: 1.9

db:VUPENid:ADV-2010-0086

Trust: 1.9

db:VUPENid:ADV-2009-3310

Trust: 1.9

db:VUPENid:ADV-2010-0982

Trust: 1.9

db:VUPENid:ADV-2010-3126

Trust: 1.9

db:VUPENid:ADV-2009-3313

Trust: 1.9

db:VUPENid:ADV-2010-3086

Trust: 1.9

db:USCERTid:TA10-222A

Trust: 1.9

db:HITACHIid:HS10-030

Trust: 1.4

db:SECUNIAid:38781

Trust: 1.1

db:SECUNIAid:42377

Trust: 1.1

db:SECUNIAid:37501

Trust: 1.1

db:SECUNIAid:39632

Trust: 1.1

db:SECUNIAid:37604

Trust: 1.1

db:SECUNIAid:41972

Trust: 1.1

db:SECUNIAid:43308

Trust: 1.1

db:SECUNIAid:38241

Trust: 1.1

db:SECUNIAid:37859

Trust: 1.1

db:SECUNIAid:40070

Trust: 1.1

db:SECUNIAid:41818

Trust: 1.1

db:SECUNIAid:39292

Trust: 1.1

db:SECUNIAid:42816

Trust: 1.1

db:SECUNIAid:42379

Trust: 1.1

db:SECUNIAid:39317

Trust: 1.1

db:SECUNIAid:42467

Trust: 1.1

db:SECUNIAid:37320

Trust: 1.1

db:SECUNIAid:37640

Trust: 1.1

db:SECUNIAid:37656

Trust: 1.1

db:SECUNIAid:37383

Trust: 1.1

db:SECUNIAid:42724

Trust: 1.1

db:SECUNIAid:38003

Trust: 1.1

db:SECUNIAid:44183

Trust: 1.1

db:SECUNIAid:42733

Trust: 1.1

db:SECUNIAid:38484

Trust: 1.1

db:SECUNIAid:40545

Trust: 1.1

db:SECUNIAid:40866

Trust: 1.1

db:SECUNIAid:38056

Trust: 1.1

db:SECUNIAid:39278

Trust: 1.1

db:SECUNIAid:42808

Trust: 1.1

db:SECUNIAid:37675

Trust: 1.1

db:SECUNIAid:39127

Trust: 1.1

db:SECUNIAid:39461

Trust: 1.1

db:SECUNIAid:39819

Trust: 1.1

db:SECUNIAid:41490

Trust: 1.1

db:SECUNIAid:39628

Trust: 1.1

db:SECUNIAid:44954

Trust: 1.1

db:SECUNIAid:48577

Trust: 1.1

db:SECUNIAid:42811

Trust: 1.1

db:SECUNIAid:37291

Trust: 1.1

db:SECUNIAid:41480

Trust: 1.1

db:SECUNIAid:37292

Trust: 1.1

db:SECUNIAid:37399

Trust: 1.1

db:SECUNIAid:39713

Trust: 1.1

db:SECUNIAid:38687

Trust: 1.1

db:SECUNIAid:37504

Trust: 1.1

db:SECUNIAid:41967

Trust: 1.1

db:SECTRACKid:1023217

Trust: 1.1

db:SECTRACKid:1023273

Trust: 1.1

db:SECTRACKid:1023274

Trust: 1.1

db:SECTRACKid:1023206

Trust: 1.1

db:SECTRACKid:1023272

Trust: 1.1

db:SECTRACKid:1023427

Trust: 1.1

db:SECTRACKid:1023218

Trust: 1.1

db:SECTRACKid:1023163

Trust: 1.1

db:SECTRACKid:1023214

Trust: 1.1

db:SECTRACKid:1023211

Trust: 1.1

db:SECTRACKid:1023219

Trust: 1.1

db:SECTRACKid:1023216

Trust: 1.1

db:SECTRACKid:1024789

Trust: 1.1

db:SECTRACKid:1023148

Trust: 1.1

db:SECTRACKid:1023213

Trust: 1.1

db:SECTRACKid:1023271

Trust: 1.1

db:SECTRACKid:1023243

Trust: 1.1

db:SECTRACKid:1023209

Trust: 1.1

db:SECTRACKid:1023215

Trust: 1.1

db:SECTRACKid:1023208

Trust: 1.1

db:SECTRACKid:1023411

Trust: 1.1

db:SECTRACKid:1023204

Trust: 1.1

db:SECTRACKid:1023224

Trust: 1.1

db:SECTRACKid:1023210

Trust: 1.1

db:SECTRACKid:1023207

Trust: 1.1

db:SECTRACKid:1023426

Trust: 1.1

db:SECTRACKid:1023428

Trust: 1.1

db:SECTRACKid:1023205

Trust: 1.1

db:SECTRACKid:1023275

Trust: 1.1

db:SECTRACKid:1023270

Trust: 1.1

db:SECTRACKid:1023212

Trust: 1.1

db:VUPENid:ADV-2010-2745

Trust: 1.1

db:VUPENid:ADV-2009-3353

Trust: 1.1

db:VUPENid:ADV-2010-3069

Trust: 1.1

db:VUPENid:ADV-2009-3354

Trust: 1.1

db:VUPENid:ADV-2009-3484

Trust: 1.1

db:VUPENid:ADV-2010-1793

Trust: 1.1

db:VUPENid:ADV-2011-0033

Trust: 1.1

db:VUPENid:ADV-2009-3220

Trust: 1.1

db:VUPENid:ADV-2010-2010

Trust: 1.1

db:VUPENid:ADV-2010-1639

Trust: 1.1

db:VUPENid:ADV-2010-1107

Trust: 1.1

db:VUPENid:ADV-2010-0916

Trust: 1.1

db:VUPENid:ADV-2009-3164

Trust: 1.1

db:VUPENid:ADV-2011-0032

Trust: 1.1

db:VUPENid:ADV-2011-0086

Trust: 1.1

db:VUPENid:ADV-2010-0748

Trust: 1.1

db:VUPENid:ADV-2010-1350

Trust: 1.1

db:VUPENid:ADV-2009-3521

Trust: 1.1

db:VUPENid:ADV-2010-0994

Trust: 1.1

db:VUPENid:ADV-2010-1191

Trust: 1.1

db:VUPENid:ADV-2010-0173

Trust: 1.1

db:VUPENid:ADV-2009-3587

Trust: 1.1

db:VUPENid:ADV-2010-0933

Trust: 1.1

db:VUPENid:ADV-2009-3205

Trust: 1.1

db:VUPENid:ADV-2010-1054

Trust: 1.1

db:VUPENid:ADV-2010-0848

Trust: 1.1

db:VUPENid:ADV-2010-1673

Trust: 1.1

db:VUPENid:ADV-2009-3165

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2009/11/05/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2009/11/07/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2009/11/23/10

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2009/11/05/5

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2009/11/20/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2009/11/06/3

Trust: 1.1

db:OSVDBid:65202

Trust: 1.1

db:OSVDBid:62210

Trust: 1.1

db:OSVDBid:60521

Trust: 1.1

db:OSVDBid:60972

Trust: 1.1

db:USCERTid:TA10-287A

Trust: 1.1

db:SECUNIAid:44292

Trust: 0.9

db:VUPENid:ADV-2010-0212

Trust: 0.8

db:VUPENid:ADV-2010-0125

Trust: 0.8

db:VUPENid:ADV-2011-1039

Trust: 0.8

db:VUPENid:ADV-2010-1942

Trust: 0.8

db:VUPENid:ADV-2010-2046

Trust: 0.8

db:VUPENid:ADV-2010-0457

Trust: 0.8

db:VUPENid:ADV-2010-2660

Trust: 0.8

db:VUPENid:ADV-2010-1280

Trust: 0.8

db:VUPENid:ADV-2009-3393

Trust: 0.8

db:SECUNIAid:38608

Trust: 0.8

db:SECUNIAid:38728

Trust: 0.8

db:SECUNIAid:38338

Trust: 0.8

db:SECUNIAid:44260

Trust: 0.8

db:SECUNIAid:37566

Trust: 0.8

db:SECUNIAid:40879

Trust: 0.8

db:SECUNIAid:44293

Trust: 0.8

db:USCERTid:SA10-222A

Trust: 0.8

db:JVNDBid:JVNDB-2009-002319

Trust: 0.8

db:PACKETSTORMid:91309

Trust: 0.2

db:PACKETSTORMid:83415

Trust: 0.2

db:PACKETSTORMid:88167

Trust: 0.2

db:PACKETSTORMid:97489

Trust: 0.2

db:PACKETSTORMid:137201

Trust: 0.2

db:PACKETSTORMid:94088

Trust: 0.2

db:PACKETSTORMid:84183

Trust: 0.2

db:PACKETSTORMid:86075

Trust: 0.2

db:EXPLOIT-DBid:10071

Trust: 0.1

db:EXPLOIT-DBid:10579

Trust: 0.1

db:PACKETSTORMid:82657

Trust: 0.1

db:PACKETSTORMid:82770

Trust: 0.1

db:PACKETSTORMid:130868

Trust: 0.1

db:PACKETSTORMid:83271

Trust: 0.1

db:PACKETSTORMid:90262

Trust: 0.1

db:PACKETSTORMid:88173

Trust: 0.1

db:PACKETSTORMid:120365

Trust: 0.1

db:PACKETSTORMid:106155

Trust: 0.1

db:PACKETSTORMid:111273

Trust: 0.1

db:PACKETSTORMid:83414

Trust: 0.1

db:PACKETSTORMid:92095

Trust: 0.1

db:PACKETSTORMid:124088

Trust: 0.1

db:PACKETSTORMid:120714

Trust: 0.1

db:PACKETSTORMid:82652

Trust: 0.1

db:PACKETSTORMid:94087

Trust: 0.1

db:PACKETSTORMid:131826

Trust: 0.1

db:PACKETSTORMid:95279

Trust: 0.1

db:PACKETSTORMid:102374

Trust: 0.1

db:PACKETSTORMid:106156

Trust: 0.1

db:PACKETSTORMid:89136

Trust: 0.1

db:PACKETSTORMid:92497

Trust: 0.1

db:PACKETSTORMid:88621

Trust: 0.1

db:PACKETSTORMid:89667

Trust: 0.1

db:PACKETSTORMid:88698

Trust: 0.1

db:PACKETSTORMid:84112

Trust: 0.1

db:PACKETSTORMid:90286

Trust: 0.1

db:PACKETSTORMid:127267

Trust: 0.1

db:PACKETSTORMid:114810

Trust: 0.1

db:PACKETSTORMid:88224

Trust: 0.1

db:PACKETSTORMid:123380

Trust: 0.1

db:PACKETSTORMid:84181

Trust: 0.1

db:CNNVDid:CNNVD-200911-069

Trust: 0.1

db:SEEBUGid:SSVID-67231

Trust: 0.1

db:VULHUBid:VHN-41001

Trust: 0.1

db:PACKETSTORMid:100765

Trust: 0.1

db:PACKETSTORMid:98419

Trust: 0.1

db:PACKETSTORMid:83521

Trust: 0.1

db:PACKETSTORMid:82647

Trust: 0.1

db:PACKETSTORMid:96463

Trust: 0.1

db:PACKETSTORMid:111920

Trust: 0.1

sources: CERT/CC: VU#120541 // VULHUB: VHN-41001 // BID: 36935 // JVNDB: JVNDB-2009-002319 // PACKETSTORM: 100765 // PACKETSTORM: 98419 // PACKETSTORM: 94088 // PACKETSTORM: 83521 // PACKETSTORM: 88167 // PACKETSTORM: 82647 // PACKETSTORM: 86075 // PACKETSTORM: 97489 // PACKETSTORM: 84183 // PACKETSTORM: 96463 // PACKETSTORM: 137201 // PACKETSTORM: 83415 // PACKETSTORM: 91309 // PACKETSTORM: 111920 // NVD: CVE-2009-3555

REFERENCES

url:http://extendedsubset.com/?p=8

Trust: 2.3

url:http://www.kb.cert.org/vuls/id/120541

Trust: 2.2

url:http://www.links.org/?p=780

Trust: 1.9

url:http://www.links.org/?p=786

Trust: 1.9

url:http://www.links.org/?p=789

Trust: 1.9

url:http://blogs.iss.net/archive/sslmitmiscsrf.html

Trust: 1.9

url:http://www.ietf.org/mail-archive/web/tls/current/msg03948.html

Trust: 1.9

url:https://bugzilla.redhat.com/show_bug.cgi?id=533125

Trust: 1.9

url:https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt

Trust: 1.9

url:http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html

Trust: 1.9

url:http://www.securityfocus.com/bid/36935

Trust: 1.9

url:http://secunia.com/advisories/37453

Trust: 1.9

url:http://secunia.com/advisories/38020

Trust: 1.9

url:http://secunia.com/advisories/39136

Trust: 1.9

url:http://secunia.com/advisories/39242

Trust: 1.9

url:http://secunia.com/advisories/39243

Trust: 1.9

url:http://secunia.com/advisories/39500

Trust: 1.9

url:http://secunia.com/advisories/40747

Trust: 1.9

url:http://www.vupen.com/english/advisories/2009/3310

Trust: 1.9

url:http://www.vupen.com/english/advisories/2009/3313

Trust: 1.9

url:http://www.vupen.com/english/advisories/2010/0086

Trust: 1.9

url:http://www.vupen.com/english/advisories/2010/0982

Trust: 1.9

url:http://www.vupen.com/english/advisories/2010/3086

Trust: 1.9

url:http://www.vupen.com/english/advisories/2010/3126

Trust: 1.9

url:http://www.us-cert.gov/cas/techalerts/ta10-222a.html

Trust: 1.9

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1

Trust: 1.7

url:http://www.arubanetworks.com/support/alerts/aid-020810.txt

Trust: 1.5

url:http://www.mozilla.org/security/announce/2010/mfsa2010-22.html

Trust: 1.5

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm12247

Trust: 1.4

url:http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html

Trust: 1.4

url:http://www.ietf.org/mail-archive/web/tls/current/msg03928.html

Trust: 1.4

url:http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during

Trust: 1.4

url:http://support.avaya.com/css/p8/documents/100081611

Trust: 1.4

url:http://support.avaya.com/css/p8/documents/100114315

Trust: 1.4

url:http://support.avaya.com/css/p8/documents/100114327

Trust: 1.4

url:http://support.citrix.com/article/ctx123359

Trust: 1.4

url:http://support.zeus.com/zws/media/docs/4.3/release_notes

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21426108

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21432298

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg24025312

Trust: 1.4

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs10-030/index.html

Trust: 1.4

url:http://www.ingate.com/relnote.php?ver=481

Trust: 1.4

url:http://www.openoffice.org/security/cves/cve-2009-3555.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html

Trust: 1.4

url:http://www.proftpd.org/docs/release_notes-1.3.2c

Trust: 1.4

url:http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html

Trust: 1.4

url:https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html

Trust: 1.4

url:https://kb.bluecoat.com/index?page=content&id=sa50

Trust: 1.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3555

Trust: 1.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3555

Trust: 1.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1

Trust: 1.1

url:http://securitytracker.com/id?1023148

Trust: 1.1

url:http://www.securitytracker.com/id?1023163

Trust: 1.1

url:http://www.securitytracker.com/id?1023204

Trust: 1.1

url:http://www.securitytracker.com/id?1023205

Trust: 1.1

url:http://www.securitytracker.com/id?1023206

Trust: 1.1

url:http://www.securitytracker.com/id?1023207

Trust: 1.1

url:http://www.securitytracker.com/id?1023208

Trust: 1.1

url:http://www.securitytracker.com/id?1023209

Trust: 1.1

url:http://www.securitytracker.com/id?1023210

Trust: 1.1

url:http://www.securitytracker.com/id?1023211

Trust: 1.1

url:http://www.securitytracker.com/id?1023212

Trust: 1.1

url:http://www.securitytracker.com/id?1023213

Trust: 1.1

url:http://www.securitytracker.com/id?1023214

Trust: 1.1

url:http://www.securitytracker.com/id?1023215

Trust: 1.1

url:http://www.securitytracker.com/id?1023216

Trust: 1.1

url:http://www.securitytracker.com/id?1023217

Trust: 1.1

url:http://www.securitytracker.com/id?1023218

Trust: 1.1

url:http://www.securitytracker.com/id?1023219

Trust: 1.1

url:http://www.securitytracker.com/id?1023224

Trust: 1.1

url:http://www.securitytracker.com/id?1023243

Trust: 1.1

url:http://www.securitytracker.com/id?1023270

Trust: 1.1

url:http://www.securitytracker.com/id?1023271

Trust: 1.1

url:http://www.securitytracker.com/id?1023272

Trust: 1.1

url:http://www.securitytracker.com/id?1023273

Trust: 1.1

url:http://www.securitytracker.com/id?1023274

Trust: 1.1

url:http://www.securitytracker.com/id?1023275

Trust: 1.1

url:http://www.securitytracker.com/id?1023411

Trust: 1.1

url:http://www.securitytracker.com/id?1023426

Trust: 1.1

url:http://www.securitytracker.com/id?1023427

Trust: 1.1

url:http://www.securitytracker.com/id?1023428

Trust: 1.1

url:http://www.securitytracker.com/id?1024789

Trust: 1.1

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b01d1d.shtml

Trust: 1.1

url:http://seclists.org/fulldisclosure/2009/nov/139

Trust: 1.1

url:http://www.securityfocus.com/archive/1/507952/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/508075/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/508130/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/515055/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/516397/100/0/threaded

Trust: 1.1

url:http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1

Trust: 1.1

url:http://secunia.com/advisories/37291

Trust: 1.1

url:http://secunia.com/advisories/37292

Trust: 1.1

url:http://secunia.com/advisories/37320

Trust: 1.1

url:http://secunia.com/advisories/37383

Trust: 1.1

url:http://secunia.com/advisories/37399

Trust: 1.1

url:http://secunia.com/advisories/37501

Trust: 1.1

url:http://secunia.com/advisories/37504

Trust: 1.1

url:http://secunia.com/advisories/37604

Trust: 1.1

url:http://secunia.com/advisories/37640

Trust: 1.1

url:http://secunia.com/advisories/37656

Trust: 1.1

url:http://secunia.com/advisories/37675

Trust: 1.1

url:http://secunia.com/advisories/37859

Trust: 1.1

url:http://secunia.com/advisories/38003

Trust: 1.1

url:http://secunia.com/advisories/38056

Trust: 1.1

url:http://secunia.com/advisories/38241

Trust: 1.1

url:http://secunia.com/advisories/38484

Trust: 1.1

url:http://secunia.com/advisories/38687

Trust: 1.1

url:http://secunia.com/advisories/38781

Trust: 1.1

url:http://secunia.com/advisories/39127

Trust: 1.1

url:http://secunia.com/advisories/39278

Trust: 1.1

url:http://secunia.com/advisories/39292

Trust: 1.1

url:http://secunia.com/advisories/39317

Trust: 1.1

url:http://secunia.com/advisories/39461

Trust: 1.1

url:http://secunia.com/advisories/39628

Trust: 1.1

url:http://secunia.com/advisories/39632

Trust: 1.1

url:http://secunia.com/advisories/39713

Trust: 1.1

url:http://secunia.com/advisories/39819

Trust: 1.1

url:http://secunia.com/advisories/40070

Trust: 1.1

url:http://secunia.com/advisories/40545

Trust: 1.1

url:http://secunia.com/advisories/40866

Trust: 1.1

url:http://secunia.com/advisories/41480

Trust: 1.1

url:http://secunia.com/advisories/41490

Trust: 1.1

url:http://secunia.com/advisories/41818

Trust: 1.1

url:http://secunia.com/advisories/41967

Trust: 1.1

url:http://secunia.com/advisories/41972

Trust: 1.1

url:http://secunia.com/advisories/42377

Trust: 1.1

url:http://secunia.com/advisories/42379

Trust: 1.1

url:http://secunia.com/advisories/42467

Trust: 1.1

url:http://secunia.com/advisories/42724

Trust: 1.1

url:http://secunia.com/advisories/42733

Trust: 1.1

url:http://secunia.com/advisories/42808

Trust: 1.1

url:http://secunia.com/advisories/42811

Trust: 1.1

url:http://secunia.com/advisories/42816

Trust: 1.1

url:http://secunia.com/advisories/43308

Trust: 1.1

url:http://secunia.com/advisories/44183

Trust: 1.1

url:http://secunia.com/advisories/44954

Trust: 1.1

url:http://secunia.com/advisories/48577

Trust: 1.1

url:http://osvdb.org/60521

Trust: 1.1

url:http://osvdb.org/60972

Trust: 1.1

url:http://osvdb.org/62210

Trust: 1.1

url:http://osvdb.org/65202

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3164

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3165

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3205

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3220

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3353

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3354

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3484

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3521

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3587

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0173

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0748

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0848

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0916

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0933

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0994

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/1054

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/1107

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/1191

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/1350

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/1639

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/1673

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/1793

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/2010

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/2745

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/3069

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0032

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0033

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0086

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010/jan/msg00000.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//may/msg00001.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//may/msg00002.html

Trust: 1.1

url:http://www.debian.org/security/2009/dsa-1934

Trust: 1.1

url:http://www.debian.org/security/2011/dsa-2141

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3253

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg01029.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg01020.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00645.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00944.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00428.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00442.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00449.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00634.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049702.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049528.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049455.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-april/039561.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-april/039957.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-may/040652.html

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-200912-01.xml

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201203-22.xml

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201406-32.xml

Trust: 1.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02436041

Trust: 1.1

url:http://itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02273751

Trust: 1.1

url:http://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02512995

Trust: 1.1

url:http://www.securityfocus.com/archive/1/522176

Trust: 1.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01945686

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg1ic67848

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg1ic68054

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg1ic68055

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2010:076

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2010:084

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2010:089

Trust: 1.1

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0119.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0130.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0155.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0165.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0167.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0337.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0338.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0339.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0768.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0770.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0786.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0807.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0865.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0986.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0987.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0880.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html

Trust: 1.1

url:http://www.us-cert.gov/cas/techalerts/ta10-287a.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-1010-1

Trust: 1.1

url:http://ubuntu.com/usn/usn-923-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-927-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-927-4

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-927-5

Trust: 1.1

url:http://openbsd.org/errata45.html#010_openssl

Trust: 1.1

url:http://openbsd.org/errata46.html#004_openssl

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2009/11/05/3

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2009/11/05/5

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2009/11/06/3

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2009/11/07/3

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2009/11/20/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2009/11/23/10

Trust: 1.1

url:https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html

Trust: 1.1

url:http://clicky.me/tlsvuln

Trust: 1.1

url:http://extendedsubset.com/renegotiating_tls.pdf

Trust: 1.1

url:http://kbase.redhat.com/faq/docs/doc-20491

Trust: 1.1

url:http://support.apple.com/kb/ht4004

Trust: 1.1

url:http://support.apple.com/kb/ht4170

Trust: 1.1

url:http://support.apple.com/kb/ht4171

Trust: 1.1

url:http://support.avaya.com/css/p8/documents/100070150

Trust: 1.1

url:http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released

Trust: 1.1

url:http://sysoev.ru/nginx/patch.cve-2009-3555.txt

Trust: 1.1

url:http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html

Trust: 1.1

url:http://wiki.rpath.com/advisories:rpsa-2009-0155

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg24006386

Trust: 1.1

url:http://www.betanews.com/article/1257452450

Trust: 1.1

url:http://www.openssl.org/news/secadv_20091111.txt

Trust: 1.1

url:http://www.opera.com/docs/changelogs/unix/1060/

Trust: 1.1

url:http://www.opera.com/support/search/view/944/

Trust: 1.1

url:http://www.tombom.co.uk/blog/?p=85

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2010-0019.html

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2011-0003.html

Trust: 1.1

url:http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html

Trust: 1.1

url:http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html

Trust: 1.1

url:https://bugzilla.mozilla.org/show_bug.cgi?id=526689

Trust: 1.1

url:https://bugzilla.mozilla.org/show_bug.cgi?id=545755

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10088

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11578

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11617

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7315

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7478

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7973

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8366

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8535

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/54158

Trust: 1.1

url:http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=126150535619567&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=133469267822771&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=130497311408250&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=127419602507642&w=2

Trust: 1.0

url:http://www-1.ibm.com/support/search.wss?rs=0&q=pm00675&apar=only

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=134254866602253&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142660345230545&w=2

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=127128920008563&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=132077688910227&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=127557596201693&w=2

Trust: 1.0

url:http://marc.info/?l=cryptography&m=125752275331877&w=2

Trust: 1.0

url:http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00014.html

Trust: 0.8

url:http://cvs.openssl.org/chngview?cn=18790

Trust: 0.8

url:http://www.links.org/files/no-renegotiation-2.patch

Trust: 0.8

url:http://blog.zoller.lu/2009/11/new-sslv3-tls-vulnerability-mitm.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu120541

Trust: 0.8

url:http://jvn.jp/cert/jvnvu490671

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-22

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3555

Trust: 0.8

url:http://secunia.com/advisories/38338

Trust: 0.8

url:http://secunia.com/advisories/38728

Trust: 0.8

url:http://secunia.com/advisories/38608

Trust: 0.8

url:http://secunia.com/advisories/44292

Trust: 0.8

url:http://secunia.com/advisories/44293

Trust: 0.8

url:http://secunia.com/advisories/40879

Trust: 0.8

url:http://secunia.com/advisories/44260

Trust: 0.8

url:http://secunia.com/advisories/37566

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-222a.html

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/1280

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/2660

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/1942

Trust: 0.8

url:http://www.vupen.com/english/advisories/2009/3393

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/0125

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/0212

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/0457

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/2046

Trust: 0.8

url:http://www.vupen.com/english/advisories/2011/1039

Trust: 0.8

url:http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_the_apache

Trust: 0.6

url:mozilla

Trust: 0.3

url:http://www.innominate.com/data/downloads/manuals/releasenotes_mguard_615_en.pdf

Trust: 0.3

url:https://lists.balabit.hu/pipermail/syslog-ng-announce/2011-february/000107.html

Trust: 0.3

url:https://lists.balabit.hu/pipermail/syslog-ng-announce/2011-february/000111.html

Trust: 0.3

url:http://blog.pfsense.org/?p=531

Trust: 0.3

url:http://www.opera.com/support/kb/view/944/

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/ssl_advisory.asc

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21410851

Trust: 0.3

url:http://www.openssl.org/news/changelog.html

Trust: 0.3

url:http://www.apache.org/dist/httpd/changes_2.2.15

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21390112

Trust: 0.3

url:http://seclists.org/bugtraq/2013/nov/att-119/esa-2013-077.txt

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03263573

Trust: 0.3

url:http://www11.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02122104

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21420576

Trust: 0.3

url:http://www.ibm.com/developerworks/java/jdk/alerts/

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas258cbfcf0a5645af7862576710041f65e

Trust: 0.3

url:http://www.matrixssl.org/archives/cat_releases.html

Trust: 0.3

url:http://www.matrixssl.org/index.html

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg24006386

Trust: 0.3

url:http://msmvps.com/blogs/alunj/archive/2009/11/18/1740656.aspx

Trust: 0.3

url:https://developer.mozilla.org/nss_3.12.5_release_notes

Trust: 0.3

url:http://www.openbsd.org/errata45.html

Trust: 0.3

url:http://www.openbsd.org/errata46.html

Trust: 0.3

url:http://article.gmane.org/gmane.network.openvpn.devel/2835

Trust: 0.3

url:http://www.opera.com/docs/changelogs/windows/1050/

Trust: 0.3

url:http://my.opera.com/securitygroup/blog/2010/01/23/alpha-testing-tls-renego-fix

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pk96157

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm10658

Trust: 0.3

url:http://www.ietf.org/mail-archive/web/tls/current/msg03942.html

Trust: 0.3

url:http://www.porcupine.org/postfix-mirror/smtp-renegotiate.pdf

Trust: 0.3

url:http://www.ssh.com/documents/33/sshtectiaguardian_2.0.2b_releasenotes.txt

Trust: 0.3

url:http://tools.ietf.org/html/rfc5746

Trust: 0.3

url:http://www.g-sec.lu/tls-ssl-proof-of-concept.html

Trust: 0.3

url:https://kb.bluecoat.com/index?page=content&id=sa44&actp=list

Trust: 0.3

url:http://www.innominate.com/data/downloads/manuals/releasenotes_mguard_516_en.pdf

Trust: 0.3

url:http://www.innominate.com/data/downloads/manuals/releasenotes_mguard_721_en.pdf

Trust: 0.3

url:http://lists.vmware.com/pipermail/security-announce/2010/000106.html

Trust: 0.3

url:/archive/1/510726

Trust: 0.3

url:/archive/1/508176

Trust: 0.3

url:/archive/1/508130

Trust: 0.3

url:/archive/1/507952

Trust: 0.3

url:http://seclists.org/bugtraq/2015/mar/84

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21415080

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-273350-1

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24025718

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24025719

Trust: 0.3

url:http://voodoo-circle.sourceforge.net/sa/sa-20091112-01.html

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100074555

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100071565

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100072446

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100077741

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100078357

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100080915

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100081602

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100082047

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100092059

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100107778

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100080668

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21607116

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20091109-tls.shtml

Trust: 0.3

url:http://fortiguard.com/psirt/fg-ir-17-137

Trust: 0.3

url:http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03024266&ac.admitted=1320706848406.876444892.492883150

Trust: 0.3

url:http://www11.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02512995&admit=109447626+1284637282234+28353475

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888

Trust: 0.3

url:http://www13.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02616748&admit=109447627+1291997777000+28353475

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1ic69118

Trust: 0.3

url:http://www.microsoft.com/technet/security/advisory/977377.mspx

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms10-049.mspx

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7005950&sliceid=1

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2010-0119.html

Trust: 0.3

url:https://kb.bluecoat.com/index?page=content&id=sa61&actp=list

Trust: 0.3

url:http://www.blackberry.com/btsc/dynamickc.do?externalid=kb25966&sliceid=1&command=show&forward=nonthreadedkc&kcid=kb25966

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://kb.vmware.com/kb/1055

Trust: 0.2

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.2

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.2

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.2

url:http://www.vmware.com/security/advisories

Trust: 0.2

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3548

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-2902

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-2693

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-2901

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3094

Trust: 0.2

url:http://www.mandriva.com/security/

Trust: 0.2

url:http://www.mandriva.com/security/advisories

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3095

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:http://marc.info/?l=bugtraq&amp;m=132077688910227&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=142660345230545&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=127419602507642&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=130497311408250&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=133469267822771&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=126150535619567&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=127128920008563&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=127557596201693&amp;w=2

Trust: 0.1

url:http://www-1.ibm.com/support/search.wss?rs=0&amp;q=pm00675&amp;apar=only

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.597446

Trust: 0.1

url:http://marc.info/?l=apache-httpd-announce&amp;m=125755783724966&amp;w=2

Trust: 0.1

url:http://marc.info/?l=cryptography&amp;m=125752275331877&amp;w=2

Trust: 0.1

url:https://kb.bluecoat.com/index?page=content&amp;id=sa50

Trust: 0.1

url:http://secunia.com/advisories/44292/

Trust: 0.1

url:http://secunia.com/research/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html#appendixas

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44292

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/company/jobs/open_positions/reverse_engineer

Trust: 0.1

url:http://secunia.com/advisories/44292/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3556

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0085

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1086

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0730

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1088

Trust: 0.1

url:http://kb.vmware.com/kb/1027919

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2939

Trust: 0.1

url:http://downloads.vmware.com/support/vsphere4/doc/vsp_esxi41_u1_rel_notes.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3571

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0095

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0307

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0092

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0093

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3548

Trust: 0.1

url:http://kb.vmware.com/kb/1031330

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3554

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3562

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0084

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0091

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0089

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3557

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3550

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0085

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1384

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3567

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0003

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0837

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3553

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0106

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2227

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0107

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2902

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2901

Trust: 0.1

url:http://downloads.vmware.com/support/vsphere4/doc/vsp_esx41_u1_rel_notes.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1085

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0091

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0841

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0840

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0291

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2248

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0415

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3561

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3541

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3559

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3565

Trust: 0.1

url:http://kb.vmware.com/kb/1027904

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0093

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0433

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0842

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0082

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3574

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0886

Trust: 0.1

url:http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0734

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1157

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0094

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0007

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0850

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2524

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0839

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1087

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0622

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0090

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3825

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3573

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1084

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5416

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1384

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0088

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0849

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2070

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4308

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3549

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3548

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2693

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0007

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3568

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0084

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5416

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3864

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3825

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0410

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1321

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3572

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0092

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1437

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0094

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3566

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0847

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0740

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0082

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0437

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0844

Trust: 0.1

url:http://downloads.vmware.com/support/pubs/vs_pages/vsp_pubs_esx41_vc41.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2066

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0089

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0087

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0087

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1436

Trust: 0.1

url:http://kb.vmware.com/kb/1029353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0085

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0846

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2226

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1173

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0008

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1641

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0106

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0845

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0848

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0095

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1187

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2521

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3569

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0090

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3081

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3551

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0843

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.7.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.18_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.7.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.7_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.3.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.18_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.14-5ubuntu8.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.3_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.12-1ubuntu2.3_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.3.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.18_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.18_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.7_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.3_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.7_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.12-1ubuntu2.3_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.18_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.18_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.12-1ubuntu2.3_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.3_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.11_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.11_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.18_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.12-1ubuntu2.3_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.18.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.14-5ubuntu8.2.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.7_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.3_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.12-1ubuntu2.3_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.12-1ubuntu2.3_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.14-5ubuntu8.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.18.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.18_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.18_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.11_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.3_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.18_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.11_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.11_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.3_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-mpm-itk_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.18_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.14-5ubuntu8.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.3_powerpc.deb

Trust: 0.1

url:http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslinsecurerenegotiation

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1195

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1890

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1890

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1678

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1195

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3095

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1891

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1191

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1678

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3094

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1891

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.3-4+etch11_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.2.3-4+etch11_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny6_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.3-4+etch11_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch11.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch11.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch4+b1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch11_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny6.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch11_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch11_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch11_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny6_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny6_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny6.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny6_hppa.deb

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny6_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch11_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch11_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b2_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch11_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch11_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny6_arm.deb

Trust: 0.1

url:http://www.arubanetworks.com/support.

Trust: 0.1

url:http://enigmail.mozdev.org/

Trust: 0.1

url:http://www.arubanetworks.com/support/wsirt.php

Trust: 0.1

url:http://www.securityfocus.com/archive/1

Trust: 0.1

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx350-201012409-sg.zip

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2409

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2409

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx350-201012408-sg.zip

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3069

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0590

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx350-201012401-sg.zip

Trust: 0.1

url:http://kb.vmware.com/kb/1030000

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0590

Trust: 0.1

url:http://kb.vmware.com/kb/1029993

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3069

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0405

Trust: 0.1

url:http://kb.vmware.com/kb/1029999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0405

Trust: 0.1

url:http://www.vmware.com/support/policies/lifecycle/vi/faq.html

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1790

Trust: 0.1

url:http://www.hpe.com/info/insightmanagement

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2019

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1792

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2020

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2018

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2022

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2027

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3508

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2026

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3509

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3511

Trust: 0.1

url:http://security.freebsd.org/patches/sa-09:16/rtld.patch.asc

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4146

Trust: 0.1

url:http://security.freebsd.org/>.

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4147

Trust: 0.1

url:http://security.freebsd.org/advisories/freebsd-sa-09:16.rtld.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-09:16/rtld7.patch

Trust: 0.1

url:http://security.freebsd.org/patches/sa-09:16/rtld7.patch.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-09:16/rtld.patch

Trust: 0.1

url:http://www.freebsd.org/handbook/makeworld.html>

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.6-0ubuntu0.8.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.6-0ubuntu0.8.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.6-0ubuntu0.8.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.6-0ubuntu0.8.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.6-0ubuntu0.8.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.6-0ubuntu0.8.04.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-0d_3.12.6-0ubuntu0.8.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.6-0ubuntu0.8.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.6-0ubuntu0.8.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.6-0ubuntu0.8.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.6-0ubuntu0.8.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-0d_3.12.6-0ubuntu0.8.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.6-0ubuntu0.8.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.6-0ubuntu0.8.04.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.6-0ubuntu0.8.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.6-0ubuntu0.8.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-0d_3.12.6-0ubuntu0.8.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.6-0ubuntu0.8.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-0d_3.12.6-0ubuntu0.8.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-0d_3.12.6-0ubuntu0.8.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.6-0ubuntu0.8.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.6-0ubuntu0.8.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.6-0ubuntu0.8.04.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.6-0ubuntu0.8.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.6-0ubuntu0.8.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.6-0ubuntu0.8.04.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.6.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.6-0ubuntu0.8.04.1_powerpc.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0580

Trust: 0.1

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0781

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4476

Trust: 0.1

url:http://h71000.www7.hp.com/openvms/products/ips/apache/csws_java.html

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1184

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2729

Trust: 0.1

sources: CERT/CC: VU#120541 // VULHUB: VHN-41001 // BID: 36935 // JVNDB: JVNDB-2009-002319 // PACKETSTORM: 100765 // PACKETSTORM: 98419 // PACKETSTORM: 94088 // PACKETSTORM: 83521 // PACKETSTORM: 88167 // PACKETSTORM: 82647 // PACKETSTORM: 86075 // PACKETSTORM: 97489 // PACKETSTORM: 84183 // PACKETSTORM: 96463 // PACKETSTORM: 137201 // PACKETSTORM: 83415 // PACKETSTORM: 91309 // PACKETSTORM: 111920 // NVD: CVE-2009-3555

CREDITS

Marsh Ray, Steve Dispensa, Martin Rex

Trust: 0.3

sources: BID: 36935

SOURCES

db:CERT/CCid:VU#120541
db:VULHUBid:VHN-41001
db:BIDid:36935
db:JVNDBid:JVNDB-2009-002319
db:PACKETSTORMid:100765
db:PACKETSTORMid:98419
db:PACKETSTORMid:94088
db:PACKETSTORMid:83521
db:PACKETSTORMid:88167
db:PACKETSTORMid:82647
db:PACKETSTORMid:86075
db:PACKETSTORMid:97489
db:PACKETSTORMid:84183
db:PACKETSTORMid:96463
db:PACKETSTORMid:137201
db:PACKETSTORMid:83415
db:PACKETSTORMid:91309
db:PACKETSTORMid:111920
db:NVDid:CVE-2009-3555

LAST UPDATE DATE

2024-12-21T22:05:14.155000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#120541date:2011-07-22T00:00:00
db:VULHUBid:VHN-41001date:2023-02-13T00:00:00
db:BIDid:36935date:2017-12-19T22:00:00
db:JVNDBid:JVNDB-2009-002319date:2016-09-08T00:00:00
db:NVDid:CVE-2009-3555date:2024-11-21T01:07:38.960

SOURCES RELEASE DATE

db:CERT/CCid:VU#120541date:2009-11-11T00:00:00
db:VULHUBid:VHN-41001date:2009-11-09T00:00:00
db:BIDid:36935date:2009-11-04T00:00:00
db:JVNDBid:JVNDB-2009-002319date:2009-12-14T00:00:00
db:PACKETSTORMid:100765date:2011-04-24T07:03:17
db:PACKETSTORMid:98419date:2011-02-11T13:13:00
db:PACKETSTORMid:94088date:2010-09-21T22:55:35
db:PACKETSTORMid:83521date:2009-12-07T21:57:59
db:PACKETSTORMid:88167date:2010-04-07T02:30:56
db:PACKETSTORMid:82647date:2009-11-16T23:36:55
db:PACKETSTORMid:86075date:2010-02-09T18:53:40
db:PACKETSTORMid:97489date:2011-01-13T03:33:06
db:PACKETSTORMid:84183date:2009-12-22T20:50:12
db:PACKETSTORMid:96463date:2010-12-08T18:34:39
db:PACKETSTORMid:137201date:2016-05-26T09:22:00
db:PACKETSTORMid:83415date:2009-12-03T21:03:04
db:PACKETSTORMid:91309date:2010-06-30T03:23:55
db:PACKETSTORMid:111920date:2012-04-17T20:41:11
db:NVDid:CVE-2009-3555date:2009-11-09T17:30:00.407