ID

VAR-201104-0076


CVE

CVE-2011-0611


TITLE

Adobe Flash Player contains unspecified code execution vulnerability

Trust: 0.8

sources: CERT/CC: VU#230057

DESCRIPTION

Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011. Adobe Flash contains a vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Failed exploit attempts will likely result in denial-of-service conditions.ogs. Multiple Web browsers are prone to a vulnerability that may allow attackers to spoof a certificate. Successful exploits will allow attackers to impersonate a legitimate site and conduct other attacks. The following browsers are affected: Internet Explorer 6 Internet Explorer 7 Mozilla Firefox 3.6.6 Google Chrome Qt 4.7. Because an object method does not correctly identify the type of object when it is referenced, remote attackers can exploit this vulnerability by enticing users to visit web pages containing malicious SWF files. This vulnerability can be used to execute Trojan attacks, which has a high level of impact and threat level, and requires users to attach great importance to it. Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers and Adobe Security Advisories and Bulletins referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-10.3.183.10" References ========== [ 1 ] APSA11-01 http://www.adobe.com/support/security/advisories/apsa11-01.html [ 2 ] APSA11-02 http://www.adobe.com/support/security/advisories/apsa11-02.html [ 3 ] APSB11-02 http://www.adobe.com/support/security/bulletins/apsb11-02.html [ 4 ] APSB11-12 http://www.adobe.com/support/security/bulletins/apsb11-12.html [ 5 ] APSB11-13 http://www.adobe.com/support/security/bulletins/apsb11-13.html [ 6 ] APSB11-21 https://www.adobe.com/support/security/bulletins/apsb11-21.html [ 7 ] APSB11-26 https://www.adobe.com/support/security/bulletins/apsb11-26.html [ 8 ] CVE-2011-0558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0558 [ 9 ] CVE-2011-0559 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0559 [ 10 ] CVE-2011-0560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0560 [ 11 ] CVE-2011-0561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0561 [ 12 ] CVE-2011-0571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0571 [ 13 ] CVE-2011-0572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0572 [ 14 ] CVE-2011-0573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0573 [ 15 ] CVE-2011-0574 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0574 [ 16 ] CVE-2011-0575 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0575 [ 17 ] CVE-2011-0577 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0577 [ 18 ] CVE-2011-0578 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0578 [ 19 ] CVE-2011-0579 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0579 [ 20 ] CVE-2011-0589 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589 [ 21 ] CVE-2011-0607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0607 [ 22 ] CVE-2011-0608 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0608 [ 23 ] CVE-2011-0609 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0609 [ 24 ] CVE-2011-0611 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0611 [ 25 ] CVE-2011-0618 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0618 [ 26 ] CVE-2011-0619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0619 [ 27 ] CVE-2011-0620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0620 [ 28 ] CVE-2011-0621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0621 [ 29 ] CVE-2011-0622 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0622 [ 30 ] CVE-2011-0623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0623 [ 31 ] CVE-2011-0624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0624 [ 32 ] CVE-2011-0625 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0625 [ 33 ] CVE-2011-0626 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0626 [ 34 ] CVE-2011-0627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0627 [ 35 ] CVE-2011-0628 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0628 [ 36 ] CVE-2011-2107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2107 [ 37 ] CVE-2011-2110 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2110 [ 38 ] CVE-2011-2125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135 [ 39 ] CVE-2011-2130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130 [ 40 ] CVE-2011-2134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134 [ 41 ] CVE-2011-2136 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136 [ 42 ] CVE-2011-2137 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137 [ 43 ] CVE-2011-2138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138 [ 44 ] CVE-2011-2139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139 [ 45 ] CVE-2011-2140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140 [ 46 ] CVE-2011-2414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414 [ 47 ] CVE-2011-2415 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415 [ 48 ] CVE-2011-2416 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416 [ 49 ] CVE-2011-2417 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417 [ 50 ] CVE-2011-2424 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424 [ 51 ] CVE-2011-2425 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425 [ 52 ] CVE-2011-2426 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2426 [ 53 ] CVE-2011-2427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2427 [ 54 ] CVE-2011-2428 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2428 [ 55 ] CVE-2011-2429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2429 [ 56 ] CVE-2011-2430 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2430 [ 57 ] CVE-2011-2444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2444 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201110-11.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Q1 Factsheets released: http://secunia.com/resources/factsheets/2011_vendor/ ---------------------------------------------------------------------- TITLE: Adobe Reader/Acrobat authplay.dll Code Execution Vulnerability SECUNIA ADVISORY ID: SA44149 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44149/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44149 RELEASE DATE: 2011-04-13 DISCUSS ADVISORY: http://secunia.com/advisories/44149/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44149/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44149 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Adobe Acrobat/Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is reported in version 10.0.2 and earlier 10.x and 9.x versions for Windows and Macintosh. SOLUTION: Do not open untrusted PDF files. ORIGINAL ADVISORY: http://www.adobe.com/support/security/advisories/apsa11-02.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.42

sources: NVD: CVE-2011-0611 // CERT/CC: VU#230057 // JVNDB: JVNDB-2011-001464 // BID: 47314 // BID: 42817 // VULHUB: VHN-48556 // VULMON: CVE-2011-0611 // PACKETSTORM: 100364 // PACKETSTORM: 100367 // PACKETSTORM: 105802 // PACKETSTORM: 100366

AFFECTED PRODUCTS

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.3

vendor:adobemodel:acrobatscope:ltversion:9.4

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:10.0.648.205

Trust: 1.0

vendor:adobemodel:flash playerscope:ltversion:10.2.154.27

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:10.0.3

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.2

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.3

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.4

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:10.2.156.12

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:10.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:gteversion:10.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 1.0

vendor:adobemodel:acrobatscope:gteversion:9.0

Trust: 1.0

vendor:adobemodel:airscope:ltversion:2.6.19140

Trust: 1.0

vendor:adobemodel:acrobat readerscope:ltversion:9.4.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:gteversion:10.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:ltversion:10.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:gteversion:9.0

Trust: 1.0

vendor:adobemodel:airscope:eqversion:2.6

Trust: 0.9

vendor:adobemodel:acrobatscope:eqversion:10.0.2

Trust: 0.9

vendor:adobemodel: - scope: - version: -

Trust: 0.8

vendor:アドビmodel:adobe flash playerscope: - version: -

Trust: 0.8

vendor:レッドハットmodel:red hat enterprise linux workstation supplementaryscope: - version: -

Trust: 0.8

vendor:レッドハットmodel:rhel desktop supplementaryscope: - version: -

Trust: 0.8

vendor:レッドハットmodel:red hat enterprise linux server supplementaryscope: - version: -

Trust: 0.8

vendor:アドビmodel:adobe acrobatscope: - version: -

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp systems insight managerscope: - version: -

Trust: 0.8

vendor:レッドハットmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:アドビmodel:adobe airscope: - version: -

Trust: 0.8

vendor:アドビmodel:adobe readerscope: - version: -

Trust: 0.8

vendor:オラクルmodel:oracle solarisscope: - version: -

Trust: 0.8

vendor:sunmodel:opensolaris build snv 134scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 41scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 104scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 83scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 106scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 131scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 56scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 38scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 126scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 125scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 133scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 54scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 129scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 93scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 151scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.2

Trust: 0.6

vendor:hpmodel:systems insight managerscope:neversion:7.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 35scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager sp6scope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 134ascope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 76scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 130scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 121scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 84scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.6

vendor:sunmodel:opensolaris build snv 101ascope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 105scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 99scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.0.0.96

Trust: 0.6

vendor:sunmodel:opensolaris build snv 111ascope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 87scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 98scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 117scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 58scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.6

vendor:hpmodel:systems insight manager sp1scope:eqversion:4.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 111scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager sp3scope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 113scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 100scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 124scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 118scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager sp2scope:eqversion:4.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 123scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 59scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 49scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 57scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 22scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 114scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 112scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 81scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 119scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 128scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 103scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 85scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 19scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 107scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 45scope: - version: -

Trust: 0.6

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 96scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 110scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 71scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 78scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 108scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 28scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 13scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 132scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 36scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 47scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 39scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 48scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 64scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 137scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 94scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 37scope: - version: -

Trust: 0.6

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.6

vendor:sunmodel:opensolaris build snv 101scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.6

vendor:sunmodel:opensolaris build snv 122scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 115scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 90scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 68scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 109scope: - version: -

Trust: 0.6

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 74scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 67scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 120scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris svn 126scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager sp5scope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 51scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 50scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 136scope: - version: -

Trust: 0.6

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 102scope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.6

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.1

Trust: 0.6

vendor:sunmodel:opensolaris build snv 02scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 77scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 61scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 111bscope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight manager updatescope:eqversion:5.31

Trust: 0.6

vendor:sunmodel:opensolaris snv 111bscope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 116scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 127scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 80scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 82scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 135scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 01scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 86scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 29scope: - version: -

Trust: 0.6

vendor:adobemodel:airscope:eqversion:1.5

Trust: 0.6

vendor:adobemodel:airscope:eqversion:2.0.4

Trust: 0.6

vendor:adobemodel:airscope:eqversion:2.0.3

Trust: 0.6

vendor:adobemodel:airscope:eqversion:2.0.2

Trust: 0.6

vendor:adobemodel:airscope:eqversion:1.0

Trust: 0.6

vendor:adobemodel:airscope:eqversion:1.5.2

Trust: 0.6

vendor:adobemodel:airscope:eqversion:1.5.3

Trust: 0.6

vendor:adobemodel:airscope:eqversion:1.1

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.12.35

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.21

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:10.2.157.51

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.4.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.25

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.156.12

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:10.0.2

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.33

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.51.66

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.13

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.4.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.4.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:9.4.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.153.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:8.2.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:10.0.1

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:10.2.154.27

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:10.0.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:10.0.3

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:sunmodel:solaris expressscope:eqversion:10

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.4.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.24

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.3

Trust: 0.3

vendor:adobemodel:acrobat professional extendedscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.3.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 151ascope:neversion: -

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:10.0.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:10.0

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.4.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.18

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:9.4.4

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:9.4.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.32.18

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.4

Trust: 0.3

vendor:adobemodel:readerscope:neversion:10.0.3

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.36

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:10.0.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.3218

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.53.64

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.2

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:10.2.159.1

Trust: 0.3

vendor:adobemodel:readerscope:neversion:9.4.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.22.87

Trust: 0.3

vendor:redmodel:hat enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.85.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:10.0.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.4.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.82.76

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.452

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.15.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.4.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10

Trust: 0.3

vendor:adobemodel:airscope:neversion:2.6.19140

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.105.6

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:10.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.42.34

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.4.3

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.3.3

Trust: 0.3

vendor:adobemodel:flash player release candidascope:eqversion:10.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.0.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.4.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.106.16

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.3.2

Trust: 0.3

vendor:redmodel:hat enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.65

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1004

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:qtwebmodel:qtscope:eqversion:4.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1033

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1044

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.391.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1012

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1039

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1031

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.365.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.326.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:4.1

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.348.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1010

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:4.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.395.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.5

Trust: 0.3

vendor:sunmodel:solaris expressscope:eqversion:11

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1051

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1061

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.385.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.319.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.296.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.374.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.1

Trust: 0.3

vendor:microsoftmodel:internet explorer sp2scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.21

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1043

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1049

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1057

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.346.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.390.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.27

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.35

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:3.6.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.20

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.368.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.126

Trust: 0.3

vendor:avayamodel:message networking mnscope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:internet explorer sp3scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.393.0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.362.0

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp3scope:eqversion:10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.04

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.323.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.370.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.380.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.361.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1018

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.278.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1017

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.02

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.379.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1062

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1020

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1042

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1058

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.334.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1054

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1030

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.328.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.3

Trust: 0.3

vendor:susemodel:linux enterprise sdkscope:eqversion:11

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.381.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.15

Trust: 0.3

vendor:avayamodel:intuity audix lx sp2scope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.394.0

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.38

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.364.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.349.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1022

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.6

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491064

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.37

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.345.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.325.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1026

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.4

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.347.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1038

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.329.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1006

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.315.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.277.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.384.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.170.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.299.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.371.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.272.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.363.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.294.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.367.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1045

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1016

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.36

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.28

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.337.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.301.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1032

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1040

Trust: 0.3

vendor:mozillamodel:seamonkey rc2scope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.343.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.355.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.327.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1055

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.11

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:internet explorer sp1scope:eqversion:6.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.29

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.308.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1019

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491036

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.341.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.0

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.338.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1015

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.19

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.7

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1024

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.276.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1041

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1021

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.336.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.305.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.7

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1034

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.38

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.320.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.17

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.224.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.339.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:sunmodel:opensolaris snv 151ascope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1035

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.01

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.330.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1014

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1001

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1056

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.292.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:sunmodel:opensolaris build snv 151ascope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1029

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.378.0

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1037

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1060

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.300.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.387.0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.290.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.386.0

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.03

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.372.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.392.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.221.8

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1063

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.289.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.304.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1028

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.04

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.6

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1046

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.303.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491059

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.332.0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:sunmodel:solaris expressscope:eqversion:9

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.340.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1013

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1023

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.373.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.353.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.2

Trust: 0.3

vendor:avayamodel:intuity audix lx r1.1scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.321.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.357.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.333.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.313.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.2

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:2.0.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.351.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:intuity audix lxscope:eqversion:1.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1027

Trust: 0.3

vendor:mozillamodel:seamonkey rc1scope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.396.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:3.1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.309.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.32

Trust: 0.3

vendor:avayamodel:intuity audix lx sp1scope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.344.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1008

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1053

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.287.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.286.0

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.2

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.358.0

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.6

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.02

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.5

Trust: 0.3

vendor:avayamodel:conferencing standard editionscope:neversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1007

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:3.0.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1047

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:3.5.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1052

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.7

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1009

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.324.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1048

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1050

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.1

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.01

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.182.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.316.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.271.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.04

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:intuity audix lxscope:eqversion:2.0

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.359.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.383.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.376.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1025

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.33

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.295.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.318.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.7

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1011

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: CERT/CC: VU#230057 // BID: 47314 // BID: 42817 // JVNDB: JVNDB-2011-001464 // CNNVD: CNNVD-201104-087 // NVD: CVE-2011-0611

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0611
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2011-0611
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#230057
value: 46.47

Trust: 0.8

NVD: CVE-2011-0611
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201104-087
value: CRITICAL

Trust: 0.6

VULHUB: VHN-48556
value: HIGH

Trust: 0.1

VULMON: CVE-2011-0611
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0611
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-48556
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2011-0611
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2011-0611
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CERT/CC: VU#230057 // VULHUB: VHN-48556 // VULMON: CVE-2011-0611 // JVNDB: JVNDB-2011-001464 // CNNVD: CNNVD-201104-087 // NVD: CVE-2011-0611 // NVD: CVE-2011-0611

PROBLEMTYPE DATA

problemtype:CWE-843

Trust: 1.0

problemtype:Mistake of type (CWE-843) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-119

Trust: 0.1

sources: VULHUB: VHN-48556 // JVNDB: JVNDB-2011-001464 // NVD: CVE-2011-0611

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 105802 // CNNVD: CNNVD-201104-087

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201104-087

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-48556 // VULMON: CVE-2011-0611

PATCH

title:RHSA-2011url:http://www.adobe.com/support/security/advisories/apsa11-02.html

Trust: 0.8

title:Publicly available PCAP filesurl:https://github.com/thongsia/Public-Pcaps

Trust: 0.1

title:threat language parserurl:https://github.com/ministryofpromise/tlp

Trust: 0.1

title:Known Exploited Vulnerabilities Detectorurl:https://github.com/Ostorlab/KEV

Trust: 0.1

title:Securelisturl:https://securelist.com/investigation-report-for-the-september-2014-equation-malware-detection-incident-in-the-us/83210/

Trust: 0.1

title:Securelisturl:https://securelist.com/it-threat-evolution-q3-2014/67637/

Trust: 0.1

title:Securelisturl:https://securelist.com/ksn-an-analysis-of-web-browsers/57767/

Trust: 0.1

title:Securelisturl:https://securelist.com/democratic-party-of-hong-kong-website-compromised-and-serving-spyware/30644/

Trust: 0.1

sources: VULMON: CVE-2011-0611 // JVNDB: JVNDB-2011-001464

EXTERNAL IDS

db:NVDid:CVE-2011-0611

Trust: 4.2

db:CERT/CCid:VU#230057

Trust: 3.1

db:SECUNIAid:44119

Trust: 2.8

db:SECUNIAid:44149

Trust: 2.7

db:BIDid:47314

Trust: 2.3

db:SECTRACKid:1025325

Trust: 2.0

db:SECTRACKid:1025324

Trust: 2.0

db:SECUNIAid:44141

Trust: 1.9

db:EXPLOIT-DBid:17175

Trust: 1.2

db:VUPENid:ADV-2011-0923

Trust: 1.2

db:VUPENid:ADV-2011-0924

Trust: 1.2

db:VUPENid:ADV-2011-0922

Trust: 1.2

db:SREASONid:8292

Trust: 1.2

db:SREASONid:8204

Trust: 1.2

db:BIDid:42817

Trust: 1.1

db:XFid:66681

Trust: 0.8

db:USCERTid:TA15-119A

Trust: 0.8

db:JVNDBid:JVNDB-2011-001464

Trust: 0.8

db:CNNVDid:CNNVD-201104-087

Trust: 0.7

db:NSFOCUSid:16716

Trust: 0.6

db:PACKETSTORMid:100507

Trust: 0.2

db:EXPLOIT-DBid:17473

Trust: 0.1

db:SEEBUGid:SSVID-20496

Trust: 0.1

db:SEEBUGid:SSVID-20472

Trust: 0.1

db:PACKETSTORMid:102748

Trust: 0.1

db:VULHUBid:VHN-48556

Trust: 0.1

db:VULMONid:CVE-2011-0611

Trust: 0.1

db:PACKETSTORMid:100364

Trust: 0.1

db:PACKETSTORMid:100367

Trust: 0.1

db:PACKETSTORMid:105802

Trust: 0.1

db:PACKETSTORMid:100366

Trust: 0.1

sources: CERT/CC: VU#230057 // VULHUB: VHN-48556 // VULMON: CVE-2011-0611 // BID: 47314 // BID: 42817 // JVNDB: JVNDB-2011-001464 // PACKETSTORM: 100364 // PACKETSTORM: 100367 // PACKETSTORM: 105802 // PACKETSTORM: 100366 // CNNVD: CNNVD-201104-087 // NVD: CVE-2011-0611

REFERENCES

url:http://www.adobe.com/support/security/advisories/apsa11-02.html

Trust: 3.2

url:http://secunia.com/advisories/44119

Trust: 2.6

url:http://secunia.com/advisories/44149

Trust: 2.6

url:http://www.kb.cert.org/vuls/id/230057

Trust: 2.4

url:http://www.adobe.com/support/security/bulletins/apsb11-07.html

Trust: 2.3

url:http://www.adobe.com/support/security/bulletins/apsb11-08.html

Trust: 2.3

url:http://www.securityfocus.com/bid/47314

Trust: 2.0

url:http://www.securitytracker.com/id?1025324

Trust: 2.0

url:http://www.securitytracker.com/id?1025325

Trust: 2.0

url:http://secunia.com/advisories/44141

Trust: 1.8

url:http://contagiodump.blogspot.com/2011/04/apr-8-cve-2011-0611-flash-player-zero.html

Trust: 1.3

url:http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html

Trust: 1.2

url:http://www.exploit-db.com/exploits/17175

Trust: 1.2

url:http://blogs.technet.com/b/mmpc/archive/2011/04/12/analysis-of-the-cve-2011-0611-adobe-flash-player-vulnerability-exploitation.aspx

Trust: 1.2

url:http://bugix-security.blogspot.com/2011/04/cve-2011-0611-adobe-flash-zero-day.html

Trust: 1.2

url:http://secunia.com/blog/210/

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14175

Trust: 1.2

url:http://www.redhat.com/support/errata/rhsa-2011-0451.html

Trust: 1.2

url:http://securityreason.com/securityalert/8204

Trust: 1.2

url:http://securityreason.com/securityalert/8292

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00004.html

Trust: 1.2

url:http://www.vupen.com/english/advisories/2011/0922

Trust: 1.2

url:http://www.vupen.com/english/advisories/2011/0923

Trust: 1.2

url:http://www.vupen.com/english/advisories/2011/0924

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/66681

Trust: 1.2

url:http://www.microsoft.com/downloads/en/details.aspx?familyid=c6f0a6ee-05ac-4eb6-acd0-362559fd2f04

Trust: 0.8

url:http://blogs.technet.com/b/srd/archive/2011/03/17/blocking-exploit-attempts-of-the-recent-flash-0-day.aspx

Trust: 0.8

url:http://jvn.jp/cert/jvnvu230057

Trust: 0.8

url:http://jvn.jp/ta/jvnta99041988/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0611

Trust: 0.8

url:http://www.jpcert.or.jp/at/2011/at110009.txt

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:https://www.us-cert.gov/ncas/alerts/ta15-119a

Trust: 0.8

url:https://cisa.gov/known-exploited-vulnerabilities-catalog

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20110418-adobe.html

Trust: 0.8

url:http://www.securityfocus.com/bid/42817

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/66681

Trust: 0.8

url:http://www.nsfocus.net/vulndb/16716

Trust: 0.6

url:http://blogs.adobe.com/psirt/2011/04/security-advisory-for-adobe-flash-player-adobe-reader-and-acrobat-apsa11-02.html

Trust: 0.4

url: cve-2011-0611 vulnerability in adobe flash player

Trust: 0.3

url:http://www.adobe.com

Trust: 0.3

url:http://www.cometforums.com/forum-70/announcement-17-new-cometbird-version-3611-has-been-released/

Trust: 0.3

url:https://bugzilla.mozilla.org/show_bug.cgi?id=578697

Trust: 0.3

url:http://blogs.oracle.com/sunsecurity/entry/cve_2010_3170_browser_wildcard

Trust: 0.3

url:http://www.microsoft.com/windows/ie/default.mspx

Trust: 0.3

url:http://www.mozilla.org/

Trust: 0.3

url:http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt

Trust: 0.3

url:http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox

Trust: 0.3

url:http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_thunderbird1

Trust: 0.3

url:http://www.mozilla.org/projects/security/pki/nss/#info

Trust: 0.3

url:http://www.trolltech.com/products/qt/

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2011-0013.html

Trust: 0.3

url:/archive/1/513396

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100114250

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100120156

Trust: 0.3

url:http://www.mozilla.org/security/announce/2010/mfsa2010-70.html

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/resources/factsheets/2011_vendor/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/843.html

Trust: 0.1

url:https://packetstormsecurity.com/files/100507/adobe-flash-player-10.2.153.1-swf-memory-corruption-vulnerability.html

Trust: 0.1

url:https://github.com/ministryofpromise/tlp

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/17175/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44141

Trust: 0.1

url:http://secunia.com/advisories/44141/#comments

Trust: 0.1

url:http://secunia.com/advisories/44141/

Trust: 0.1

url:http://secunia.com/advisories/44119/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44119

Trust: 0.1

url:http://secunia.com/advisories/44119/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0579

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0624

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0622

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0626

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0608

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0574

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2414

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0625

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2417

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0575

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2415

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0572

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2444

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0623

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0560

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0620

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0560

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0609

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0624

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0626

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2425

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2107

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2416

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb11-02.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2429

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2110

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0574

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0573

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0575

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2424

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0559

Trust: 0.1

url:https://www.adobe.com/support/security/bulletins/apsb11-21.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2426

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0579

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb11-13.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0578

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0611

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb11-12.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0573

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0572

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0618

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0619

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2137

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0558

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0589

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2136

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0578

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0623

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0577

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0589

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0609

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0627

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2428

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0619

Trust: 0.1

url:https://www.adobe.com/support/security/bulletins/apsb11-26.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0607

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2430

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2427

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201110-11.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2140

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0559

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0625

Trust: 0.1

url:http://www.adobe.com/support/security/advisories/apsa11-01.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0608

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0622

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0611

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0618

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0577

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://secunia.com/advisories/44149/#comments

Trust: 0.1

url:http://secunia.com/advisories/44149/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44149

Trust: 0.1

sources: CERT/CC: VU#230057 // VULHUB: VHN-48556 // VULMON: CVE-2011-0611 // BID: 47314 // BID: 42817 // JVNDB: JVNDB-2011-001464 // PACKETSTORM: 100364 // PACKETSTORM: 100367 // PACKETSTORM: 105802 // PACKETSTORM: 100366 // CNNVD: CNNVD-201104-087 // NVD: CVE-2011-0611

CREDITS

Mila Parkour

Trust: 0.3

sources: BID: 47314

SOURCES

db:CERT/CCid:VU#230057
db:VULHUBid:VHN-48556
db:VULMONid:CVE-2011-0611
db:BIDid:47314
db:BIDid:42817
db:JVNDBid:JVNDB-2011-001464
db:PACKETSTORMid:100364
db:PACKETSTORMid:100367
db:PACKETSTORMid:105802
db:PACKETSTORMid:100366
db:CNNVDid:CNNVD-201104-087
db:NVDid:CVE-2011-0611

LAST UPDATE DATE

2024-12-20T19:46:43.650000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#230057date:2011-04-21T00:00:00
db:VULHUBid:VHN-48556date:2018-10-30T00:00:00
db:VULMONid:CVE-2011-0611date:2024-02-02T00:00:00
db:BIDid:47314date:2013-06-20T09:39:00
db:BIDid:42817date:2015-04-13T21:54:00
db:JVNDBid:JVNDB-2011-001464date:2024-02-26T07:30:00
db:CNNVDid:CNNVD-201104-087date:2011-04-26T00:00:00
db:NVDid:CVE-2011-0611date:2024-12-20T14:46:32.543

SOURCES RELEASE DATE

db:CERT/CCid:VU#230057date:2011-04-12T00:00:00
db:VULHUBid:VHN-48556date:2011-04-13T00:00:00
db:VULMONid:CVE-2011-0611date:2011-04-13T00:00:00
db:BIDid:47314date:2011-04-11T00:00:00
db:BIDid:42817date:2010-08-27T00:00:00
db:JVNDBid:JVNDB-2011-001464date:2011-04-28T00:00:00
db:PACKETSTORMid:100364date:2011-04-13T06:15:56
db:PACKETSTORMid:100367date:2011-04-13T06:16:04
db:PACKETSTORMid:105802date:2011-10-14T06:16:06
db:PACKETSTORMid:100366date:2011-04-13T06:16:01
db:CNNVDid:CNNVD-201104-087date:2011-04-14T00:00:00
db:NVDid:CVE-2011-0611date:2011-04-13T14:55:01.217