ID

VAR-201404-0288


CVE

CVE-2014-0114


TITLE

TERASOLUNA Server Framework for Java(Web) vulnerable to ClassLoader manipulation

Trust: 0.8

sources: JVNDB: JVNDB-2014-000056

DESCRIPTION

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. TERASOLUNA Server Framework for Java(Web) provided by NTT DATA Corporation is a software framework for creating Java web applications. TERASOLUNA Server Framework for Java(Web) bundles Apache Struts 1.2.9, which contains a vulnerability where the ClassLoader may be manipulated (CVE-2014-0114). Therefore, this vulnerability affects TERASOLUNA Server Framework for Java(Web) as well.On a server where the product in running, a remote attacker may steal information or execute arbitrary code. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Apache Struts versions 1.0.0 through 1.3.10 are vulnerable. Description: Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. (CVE-2014-0114) Refer to the readme.txt file included with the patch files for installation instructions. Solution: The References section of this erratum contains a download link (you must log in to download the update). Security Fix(es): * Apache Struts 1: Class Loader manipulation via request parameters (CVE-2014-0114) * thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands (CVE-2016-5397) * slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088) * jolokia: JMX proxy mode vulnerable to remote code execution (CVE-2018-1000130) * bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data (CVE-2016-1000338) * bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339) * bouncycastle: Information exposure in DSA signature generation via timing attack (CVE-2016-1000341) * bouncycastle: ECDSA improper validation of ASN.1 encoding of signature (CVE-2016-1000342) * bouncycastle: DHIES implementation allowed the use of ECB mode (CVE-2016-1000344) * bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack (CVE-2016-1000345) * bouncycastle: Other party DH public keys are not fully validated (CVE-2016-1000346) * bouncycastle: ECIES implementation allowed the use of ECB mode (CVE-2016-1000352) * async-http-client: Invalid URL parsing with '?' (CVE-2017-14063) * undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service (CVE-2018-1114) * spring-framework: Directory traversal vulnerability with static resources on Windows filesystems (CVE-2018-1271) * tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service (CVE-2018-1338) * tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service (CVE-2018-1339) * pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF (CVE-2018-8036) * jolokia: Cross site scripting in the HTTP servlet (CVE-2018-1000129) * bouncycastle: flaw in the low-level interface to RSA key pair generator (CVE-2018-1000180) * bouncycastle: Carry propagation bug in math.raw.Nat??? class (CVE-2016-1000340) * bouncycastle: DSA key pair generator generates a weak private key by default (CVE-2016-1000343) * spring-framework: Multipart content pollution (CVE-2018-1272) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Chris McCown for reporting CVE-2018-8088. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. Installation instructions are located in the download section of the customer portal. Bugs fixed (https://bugzilla.redhat.com/): 1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters 1487563 - CVE-2017-14063 async-http-client: Invalid URL parsing with '?' 1544620 - CVE-2016-5397 thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands 1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution 1559316 - CVE-2018-1000130 jolokia: JMX proxy mode vulnerable to remote code execution 1559317 - CVE-2018-1000129 jolokia: Cross site scripting in the HTTP servlet 1564408 - CVE-2018-1272 spring-framework: Multipart content pollution 1571050 - CVE-2018-1271 spring-framework: Directory traversal vulnerability with static resources on Windows filesystems 1572421 - CVE-2018-1338 tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service 1572424 - CVE-2018-1339 tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service 1573045 - CVE-2018-1114 undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service 1588306 - CVE-2018-1000180 bouncycastle: flaw in the low-level interface to RSA key pair generator 1588313 - CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data 1588314 - CVE-2016-1000344 bouncycastle: DHIES implementation allowed the use of ECB mode 1588323 - CVE-2016-1000345 bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack 1588327 - CVE-2016-1000346 bouncycastle: Other party DH public keys are not fully validated 1588330 - CVE-2016-1000352 bouncycastle: ECIES implementation allowed the use of ECB mode 1588688 - CVE-2016-1000340 bouncycastle: Carry propagation bug in math.raw.Nat??? class 1588695 - CVE-2016-1000339 bouncycastle: Information leak in AESFastEngine class 1588708 - CVE-2016-1000341 bouncycastle: Information exposure in DSA signature generation via timing attack 1588715 - CVE-2016-1000342 bouncycastle: ECDSA improper validation of ASN.1 encoding of signature 1588721 - CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default 1597490 - CVE-2018-8036 pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF 5. This is a different underlying flaw. For future reference, please use CVE-2014-0114 in regards to this issue. [1] http://struts.apache.org/release/2.3.x/docs/s2-021.html -- Ren\xe9 Gielen http://twitter.com/rgielen . _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114 http://advisories.mageia.org/MGASA-2014-0219.html _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: 2341ea3fd6c92a10ab4c0be7ef5ca9da mes5/i586/struts-1.2.9-6.1mdvmes5.2.i586.rpm 8d911347cc4fdb08383a2d6ad21860e6 mes5/i586/struts-javadoc-1.2.9-6.1mdvmes5.2.i586.rpm fc1e7ac540a1d4c923cf773769c976b2 mes5/i586/struts-manual-1.2.9-6.1mdvmes5.2.i586.rpm 3304297e4b88aae688e8edcdd11bf478 mes5/i586/struts-webapps-tomcat5-1.2.9-6.1mdvmes5.2.i586.rpm b508c226756fcb2a82a8b5e2e84af466 mes5/SRPMS/struts-1.2.9-6.1mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 7e2abd47c0862fa5010ee686d76d2353 mes5/x86_64/struts-1.2.9-6.1mdvmes5.2.x86_64.rpm 96dd8e36bf4b46577498ad8616dce319 mes5/x86_64/struts-javadoc-1.2.9-6.1mdvmes5.2.x86_64.rpm 37a1b595d7f2f73bdff8d13bcb70e0a6 mes5/x86_64/struts-manual-1.2.9-6.1mdvmes5.2.x86_64.rpm 8c298a1e1e9e8ad81acb0166b2f18109 mes5/x86_64/struts-webapps-tomcat5-1.2.9-6.1mdvmes5.2.x86_64.rpm b508c226756fcb2a82a8b5e2e84af466 mes5/SRPMS/struts-1.2.9-6.1mdvmes5.2.src.rpm Mandriva Business Server 1/X86_64: 1e1b9440affefd05d5fe0c4860fdcd9b mbs1/x86_64/struts-1.3.10-3.1.mbs1.noarch.rpm 5ae68b0b7f991676f67562a51dd956a7 mbs1/x86_64/struts-javadoc-1.3.10-3.1.mbs1.noarch.rpm f135f96b6d2121b157b7a62afd449ea6 mbs1/SRPMS/struts-1.3.10-3.1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTdeNbmqjQ0CJFipgRAo5XAJ4oaaS6iRfHSPHEO3og+Se4kWkdfgCgrhMb HUtc9GTxbEwte2/fTU7bJ5M= =5Ewj -----END PGP SIGNATURE----- . For the stable distribution (wheezy), this problem has been fixed in version 1.2.9-5+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 1.2.9-9. Release Date: 2014-08-12 Last Updated: 2014-08-12 Potential Security Impact: Remote execution of arbitrary code Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP SiteScope . References: CVE-2014-0114 (SSRT101662) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP SiteScope: v11.1x, v11.2x BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-0114 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided patches for HP SiteScope to address the vulnerability. Download the patch from HP Software Support Online according to the table below. SiteScope Affected version Resolution patch details Link to download 11.1x SiteScope 11.13 Windows 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00315 SiteScope 11.13 Windows 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00316 SiteScope 11.13 Linux 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00317 SiteScope 11.13 Linux 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00318 SiteScope 11.13 Solaris 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00319 SiteScope 11.13 Solaris 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00320 11.2x SiteScope 11.24.271 Intermediate Patch for Windows 32bit and 64bit http://support.openview.hp.com/selfsolve/document/LID/SIS_00321 SiteScope 11.24.271 Intermediate Patch for Windows 32bit on 64bit http://support.openview.hp.com/selfsolve/document/LID/SIS_00322 SiteScope 11.24.271 Intermediate Patch for Linux http://support.openview.hp.com/selfsolve/document/LID/SIS_00323 SiteScope 11.24.271 Intermediate Patch for Solaris http://support.openview.hp.com/selfsolve/document/LID/SIS_00324 HISTORY Version:1 (rev.1) - 12 August 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Workaround ========== There is no known workaround at this time. Resolution ========== All Commons BeanUtils users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=dev-java/commons-beanutils-1.9.2" References ========== [ 1 ] CVE-2014-0114 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201607-09 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: struts security update Advisory ID: RHSA-2014:0500-01 Product: Red Hat Satellite Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0500.html Issue date: 2014-05-14 CVE Names: CVE-2014-0114 ===================================================================== 1. Summary: Updated struts packages that fix one security issue are now available for Red Hat Network Satellite 5.4 and 5.5, and Red Hat Satellite 5.6. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Satellite 5.4 (RHEL v.6) - noarch Red Hat Satellite 5.5 (RHEL v.6) - noarch Red Hat Satellite 5.6 (RHEL v.6) - noarch 3. Description: Red Hat Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and remote management of multiple Linux deployments with a single, centralized tool. This could lead to remote code execution under certain conditions. (CVE-2014-0114) All Satellite users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For this update to take effect, the tomcat6 service must be restarted ("service tomcat6 restart"). 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters 6. Package List: Red Hat Satellite 5.4 (RHEL v.6): Source: struts-1.3.10-6.ep5.el6.src.rpm noarch: struts-1.3.10-6.ep5.el6.noarch.rpm struts-core-1.3.10-6.ep5.el6.noarch.rpm struts-extras-1.3.10-6.ep5.el6.noarch.rpm struts-taglib-1.3.10-6.ep5.el6.noarch.rpm struts-tiles-1.3.10-6.ep5.el6.noarch.rpm Red Hat Satellite 5.5 (RHEL v.6): Source: struts-1.3.10-6.ep5.el6.src.rpm noarch: struts-1.3.10-6.ep5.el6.noarch.rpm struts-core-1.3.10-6.ep5.el6.noarch.rpm struts-extras-1.3.10-6.ep5.el6.noarch.rpm struts-taglib-1.3.10-6.ep5.el6.noarch.rpm struts-tiles-1.3.10-6.ep5.el6.noarch.rpm Red Hat Satellite 5.6 (RHEL v.6): Source: struts-1.3.10-6.ep5.el6.src.rpm noarch: struts-1.3.10-6.ep5.el6.noarch.rpm struts-core-1.3.10-6.ep5.el6.noarch.rpm struts-extras-1.3.10-6.ep5.el6.noarch.rpm struts-taglib-1.3.10-6.ep5.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0114.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTc7+TXlSAg2UNWIIRAmptAJ9n47yYBOA5OA5jE3gLpsRx20tKagCfWNc8 M3/iYEVhVrBlugdrBQzYI+U= =k5DC -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Thanks to the efforts of Alvaro Munoz and the HP Fortify team, the Apache Struts project team can recommend a first mitigation that is relatively simple to apply. It involves the introduction of a generic Servlet filter, adding the possibility to blacklist unacceptable request parameters based on regular expressions. Please see the corresponding HP Fortify blog entry [2] for detailed instructions. Based on this information, the Apache Struts project team recommends to apply the mitigation advice *immediately* for all Struts 1 based applications. Struts 1 has had its End-Of-Life announcement more than one year ago [3]. However, in a cross project effort the Struts team is looking for a correction or an improved mitigation path. Please stay tuned for further information regarding a solution. This is a cross-list posting. If you have questions regarding this report, please direct them to security@struts.apache.org only. [1] http://struts.apache.org/release/2.3.x/docs/s2-021.html [2] http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.U2J7xeaSxro [3] http://struts.apache.org/struts1eol-announcement.html -- Ren\xe9 Gielen http://twitter.com/rgielen

Trust: 3.51

sources: NVD: CVE-2014-0114 // JVNDB: JVNDB-2014-000056 // JVNDB: JVNDB-2014-002308 // BID: 67121 // VULMON: CVE-2014-0114 // PACKETSTORM: 126618 // PACKETSTORM: 149311 // PACKETSTORM: 126392 // PACKETSTORM: 126692 // PACKETSTORM: 127957 // PACKETSTORM: 127868 // PACKETSTORM: 137980 // PACKETSTORM: 126620 // PACKETSTORM: 126455

AFFECTED PRODUCTS

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-00

Trust: 1.8

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-50-03

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-50-00

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10-10

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-12

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50-13

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50-00

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-10-00-03

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-10-00-00

Trust: 1.5

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10-00

Trust: 1.5

vendor:apachemodel:strutsscope:eqversion:1.2.4

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.2.7

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.2.6

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.3.10

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.2.2

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.1

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.3.5

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.0.2

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.2.8

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.3.8

Trust: 1.3

vendor:apachemodel:strutsscope:eqversion:1.2.9

Trust: 1.3

vendor:hitachimodel:tiered storage manager software -00 )scope:eqversion:7.1.1

Trust: 1.2

vendor:hitachimodel:tiered storage manager software )scope:eqversion:7.3-00

Trust: 1.2

vendor:ibmmodel:connectionsscope:eqversion:4.0

Trust: 1.1

vendor:ibmmodel:connectionsscope:eqversion:4.5

Trust: 1.1

vendor:ibmmodel:websphere portalscope:eqversion:8.0

Trust: 1.1

vendor:ibmmodel:connectionsscope:eqversion:5.0

Trust: 1.1

vendor:ibmmodel:content collectorscope:eqversion:2.2

Trust: 1.1

vendor:ibmmodel:websphere portalscope:eqversion:8.5

Trust: 1.1

vendor:apachemodel:commons beanutilsscope:lteversion:1.9.1

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.0

Trust: 1.0

vendor:hitachimodel:device manager software -00 )scope:eqversion:7.3

Trust: 0.9

vendor:hitachimodel:device manager software )scope:eqversion:7.4-00

Trust: 0.9

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-11-00

Trust: 0.9

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-00-00

Trust: 0.9

vendor:ntt datamodel:terasoluna server framework for javascope:eqversion:2.0.0.1 to 2.0.5.1

Trust: 0.8

vendor:apachemodel:strutsscope:eqversion:1.x to 1.3.10

Trust: 0.8

vendor:富士通model:クラウド インフラ マネージメント ソフトウェアscope: - version: -

Trust: 0.8

vendor:富士通model:fujitsu integrated system ha database readyscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business analytics modeling server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business process manager analytics

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:mobile manager

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:extreme transaction processing server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:navigator explorer server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application development cycle manager

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application framework suite

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:apworks

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business application server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:job workload server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:service integrator

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:studio

Trust: 0.8

vendor:富士通model:interstage application development cycle managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage application framework suitescope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage application serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage apworksscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage business application serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage job workload serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage service integratorscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage studioscope:eqversion: -

Trust: 0.8

vendor:富士通model:serverviewscope:eqversion:resource orchestrator

Trust: 0.8

vendor:富士通model:symfowarescope:eqversion:analytics server

Trust: 0.8

vendor:富士通model:symfowarescope:eqversion:server

Trust: 0.8

vendor:富士通model:systemwalker service catalog managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:systemwalker service quality coordinatorscope:eqversion: -

Trust: 0.8

vendor:富士通model:systemwalker software configuration managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:triolescope:eqversion:cloud middle set b set

Trust: 0.8

vendor:日立model:hitachi device managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi global link managerscope:eqversion:software

Trust: 0.8

vendor:日立model:job management partner 1/performance management - web consolescope:eqversion: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope:eqversion:- manager web option

Trust: 0.8

vendor:日立model:jp1/performance managementscope:eqversion:- web console

Trust: 0.8

vendor:日立model:hitachi replication managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi tiered storage managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi tuning managerscope:eqversion:software

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp device managerscope:eqversion: -

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp7scope:eqversion:global link manager software

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp p9000scope:eqversion:replication manager

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp p9000scope:eqversion:tiered storage manager

Trust: 0.8

vendor:ibmmodel:connectionsscope:lteversion:3.0.1.1

Trust: 0.8

vendor:ibmmodel:lotus expeditorscope:eqversion:6.1.x

Trust: 0.8

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2.x

Trust: 0.8

vendor:ibmmodel:lotus mashupsscope:eqversion:2.0.0.2

Trust: 0.8

vendor:ibmmodel:lotus mashupsscope:eqversion:3.0.0.1

Trust: 0.8

vendor:ibmmodel:lotus quickrscope:eqversion:8.5 for websphere portal

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.2

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.3

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.3.1

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:7

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:6.1.x

Trust: 0.8

vendor:日本電気model:esmpro/servermanagerscope:lteversion:ver5.75

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:pc security

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:security risk management v1.0.0 to v1.0.6

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:security risk management v1.0.0 to v2.1.3

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:enterprise edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:enterprise edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager enterprise v7.1

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager lite v2.0

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager standard v2.0

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard-j edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard-j edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:web edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:web edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:application server v7.1

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:developer v8.2 to v8.4 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:developer v9.1 to v9.2 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:portal v8.3 to v8.4

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:portal v9.1

Trust: 0.8

vendor:日本電気model:webotx application serverscope:eqversion:v7.1

Trust: 0.8

vendor:日本電気model:webotx developerscope:eqversion:v8.2 to v8.4 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotx developerscope:eqversion:v9.1 to v9.2 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotx portalscope:eqversion:v8.3 to v8.4

Trust: 0.8

vendor:日本電気model:webotx portalscope:eqversion:v9.1

Trust: 0.8

vendor:株式会社エヌ ティ ティ データmodel:terasoluna server framework for javascope:lteversion:2.0.0.1 from 2.0.5.1

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution 6.2.1.0.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution asr: 49.0.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution lsr: 10.1.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution lsr: 9.4.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.1.5

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.2.1

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.2.2

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle enterprise data quality 8.1.2

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle enterprise data quality 9.0.11

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 10.1.3.5

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 11.1.2.4

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 12.1.2.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 12.1.3.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle waveset 8.1.1

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.0.1.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.2.1.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.3.6.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle real-time decision server 11.1.1.7 (rtd platform 3.0.x)

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.1.5

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.2.1

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.2.2

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera contract management 13.1

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera contract management 14.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 7.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.1

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.2

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 10.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 11.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 12.0.9in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 8.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 12.0.9in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 8.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 11.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.0 in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:10.0.2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:10.3.6.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.1.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.3.0

Trust: 0.8

vendor:hitachimodel:device manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-03

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-11-08

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:jp1/performance management manager web optionscope:eqversion:-07-00

Trust: 0.6

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-00-12

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-03

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.6.1-05

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-04

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:9.1

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-01

Trust: 0.6

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.4.0-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.4.0-01

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:8.5

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-06

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-00

Trust: 0.6

vendor:hitachimodel:tuning manager softwarescope:eqversion:8.0.0-03

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:tuning manager softwarescope:eqversion:8.0.0-04

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-04

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.0-00

Trust: 0.6

vendor:hitachimodel:jp1/performance management manager web optionscope:eqversion:-07-54

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:8.1

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:8.7

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-10-08

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-01

Trust: 0.6

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-10-00

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.17

Trust: 0.3

vendor:ibmmodel:openpagesscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(susescope:eqversion:8.0.0-05

Trust: 0.3

vendor:oraclemodel:retail allocationscope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:8.0

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.3.0.3.0

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.6-00

Trust: 0.3

vendor:ibmmodel:security qradarscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli storage manager administration centerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler z/os connectorscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:records managerscope:eqversion:8.5

Trust: 0.3

vendor:oraclemodel:retail clearance optimization enginescope:eqversion:13.4

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.401

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5

Trust: 0.3

vendor:ibmmodel:social media analyticsscope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00

Trust: 0.3

vendor:ntt datamodel:terasoluna server framework for javascope:neversion:2.0.5.2

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:5.1

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:15.1

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.1.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(x6scope:eqversion:7.6.1-05

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-06(x64))

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:3.5.0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(susescope:neversion:8.0.0-06

Trust: 0.3

vendor:redhatmodel:fuse esb enterprisescope:eqversion:7.1.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0.43

Trust: 0.3

vendor:ibmmodel:ds8870scope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:8.0.0-05

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:knowledgescope:eqversion:8.6.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.6.1-05

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:1.0.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.13

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(susescope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.4

Trust: 0.3

vendor:ibmmodel:content analytics with enterprise searchscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:7.5.0

Trust: 0.3

vendor:hpmodel:xp p9000 tiered storage managerscope:eqversion:1.1.0-00

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.3

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.47

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.6.0.0

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:14.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp3scope:eqversion:11

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.3.0.1.0

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0

Trust: 0.3

vendor:junipermodel:secure analytics 2013.2r8scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:job management partner 1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0.41

Trust: 0.3

vendor:ibmmodel:content manager records enablerscope:eqversion:8.5

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-06

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:eqversion:1.1.1.19

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:eqversion:6.2.1

Trust: 0.3

vendor:ibmmodel:content navigatorscope:eqversion:2.0.1

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:7.3-00

Trust: 0.3

vendor:oraclemodel:primavera contract managementscope:eqversion:14.0

Trust: 0.3

vendor:hitachimodel:tuning manager software (linux(rhelscope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:openpagesscope:eqversion:7.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.0.x

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-04(x64))

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:8.2.1

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.43

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:8.0.0-05

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:7.0

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.1.10

Trust: 0.3

vendor:redhatmodel:jboss operations networkscope:eqversion:3.2.1

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:8.3

Trust: 0.3

vendor:hpmodel:device managerscope:eqversion:1.0.0-00

Trust: 0.3

vendor:ibmmodel:content navigatorscope:eqversion:2.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.6.1-05

Trust: 0.3

vendor:hpmodel:xp7 global link manager softwarescope:eqversion:6.4.0-00

Trust: 0.3

vendor:hitachimodel:raplication manager software (linux(rhelscope:eqversion:8.0.0-05

Trust: 0.3

vendor:hpmodel:xp p9000 tiered storage managerscope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:websphere partner gateway advanced editionscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:weblogic portalscope:eqversion:10.0.1.0

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0.42

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:3.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.5-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:neversion:8.0.0-06

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.5.0-02

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf1scope:eqversion:10.2.1

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.20

Trust: 0.3

vendor:oraclemodel:primavera contract managementscope:eqversion:13.1

Trust: 0.3

vendor:hpmodel:xp p9000 tiered storage managerscope:eqversion:8.0.0-06

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-10-07

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.27

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:8.0.0-05

Trust: 0.3

vendor:oraclemodel:knowledgescope:eqversion:8.5.1.7

Trust: 0.3

vendor:ibmmodel:websphere lombardi editionscope:eqversion:7.1.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.6.1-05

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:tivoli provisioning managerscope:eqversion:5.1

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.1

Trust: 0.3

vendor:hitachimodel:tuning manager software (linux(susescope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:websphere sensor eventsscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:openpagesscope:eqversion:6.0.1.5

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.1.0

Trust: 0.3

vendor:junipermodel:security threat response managerscope:eqversion:2012.1

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.2

Trust: 0.3

vendor:hpmodel:xp p9000 replication managerscope:eqversion:6.0.0-00

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:2.0.10

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.2.1-00

Trust: 0.3

vendor:ibmmodel:qradar siem mr2scope:eqversion:7.1

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.4

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.5

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:websphere service registry and repositoryscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:filenet p8 platform content search enginescope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:tivoli identity managerscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:tivoli netcool/omnibus web guiscope:eqversion:7.4

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.35

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(x6scope:eqversion:7.6.1-05

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for webspherescope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:ds8870scope:eqversion:7.3

Trust: 0.3

vendor:hitachimodel:raplication manager software (linux(susescope:eqversion:8.0.0-00

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.001

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:qradar siem mr5scope:eqversion:7.0

Trust: 0.3

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.0

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.07

Trust: 0.3

vendor:ibmmodel:infosphere identity insightscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.3

Trust: 0.3

vendor:oraclemodel:retail allocationscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:infosphere master data management collaborative editionscope:eqversion:-10.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.1.1-00

Trust: 0.3

vendor:ibmmodel:qradar siem mr2scope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:neversion:8.0.0-06

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:endpoint manager for remote controlscope:eqversion:9.1.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.39

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:ibmmodel:predictive insightscope:eqversion:7.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.4

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.23

Trust: 0.3

vendor:ibmmodel:social media analyticsscope:eqversion:1.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:eqversion:2.2

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.4

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.5

Trust: 0.3

vendor:hitachimodel:global link manager software (linux(rhelscope:eqversion:7.6.1-01

Trust: 0.3

vendor:oraclemodel:retail allocationscope:eqversion:13.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.15

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-03

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler z/os connectorscope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:application manager for smart businessscope:eqversion:1.2.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.31

Trust: 0.3

vendor:oraclemodel:jdeveloperscope:eqversion:10.1.3.5.0

Trust: 0.3

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2.3

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:neversion:8.0.0-06

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-08

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:14.0

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-11-01

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.5.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.0

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.2.0.3.0

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-03(x64))

Trust: 0.3

vendor:oraclemodel:retail back office 12.0.9inscope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-00

Trust: 0.3

vendor:ibmmodel:tivoli netcool configuration managerscope:eqversion:6.4

Trust: 0.3

vendor:oraclemodel:real-time decision platformscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:filenet content manager content enginescope:eqversion:5.2.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0.2

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-07

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:redhatmodel:network satellite server (for rhelscope:eqversion:6)5.5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.31

Trust: 0.3

vendor:ibmmodel:filenet p8 platform content search enginescope:eqversion:4.5.1

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.05

Trust: 0.3

vendor:ibmmodel:infosphere master data management collaborative editionscope:eqversion:-11.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.55

Trust: 0.3

vendor:ibmmodel:tivoli netcool configuration managerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:security qradarscope:eqversion:7.2.2

Trust: 0.3

vendor:ibmmodel:tivoli foundations for application managerscope:eqversion:1.2

Trust: 0.3

vendor:ibmmodel:infosphere master data management server for product informationscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.1

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:2.5.0.0

Trust: 0.3

vendor:oraclemodel:identity managerscope:eqversion:11.1.1.5

Trust: 0.3

vendor:oraclemodel:wavesetscope:eqversion:8.1.1

Trust: 0.3

vendor:ibmmodel:tivoli identity managerscope:eqversion:5.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.0

Trust: 0.3

vendor:redhatmodel:network satellite server (for rhelscope:eqversion:6)5.4

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-11

Trust: 0.3

vendor:oraclemodel:jdeveloperscope:eqversion:11.1.24.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:tivoli netcool configuration managerscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-00-11

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.4

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:neversion:8.0.0-06

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.402

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.2.1-00

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.2.1-01

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.00

Trust: 0.3

vendor:junipermodel:secure analytics 2012.1r7scope:neversion: -

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.4.0-03

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(opscope:eqversion:7.4.0-00

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.2

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:insurance ifrs analyzerscope:eqversion:178.0.7

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:56001

Trust: 0.3

vendor:ibmmodel:financial transaction managerscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:tivoli storage manager administration centerscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.0.11

Trust: 0.3

vendor:oraclemodel:retail markdown optimizationscope:eqversion:13.1

Trust: 0.3

vendor:junipermodel:secure analyticsscope:eqversion:2013.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:websphere lombardi editionscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:infosphere balanced warehouse c4000scope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-00(x64))

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.33

Trust: 0.3

vendor:oraclemodel:fusion middlewarescope:eqversion:11.1.17.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.03

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.24

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.5

Trust: 0.3

vendor:ibmmodel:websphere partner gateway express editionscope:eqversion:6.0.0.3

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.4

Trust: 0.3

vendor:oraclemodel:retail markdown optimizationscope:eqversion:13.0

Trust: 0.3

vendor:ntt datamodel:terasoluna server framework for javascope:eqversion:2.0.51

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.3

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2.177

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.45

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.01

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.1

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:2.0.0.0

Trust: 0.3

vendor:hitachimodel:tuning manager software (linux(susescope:neversion:8.0.0-06

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.1.0.1.0

Trust: 0.3

vendor:oraclemodel:communications metasolv solutionscope:eqversion:6.2.10.0

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:filenet p8 platform content search enginescope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:raplication manager software (linux(rhelscope:eqversion:8.0.0-00

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:2.0

Trust: 0.3

vendor:f5model:big-ip edge gateway hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:13.2

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.06

Trust: 0.3

vendor:liferaymodel:portalscope:eqversion:6.2.1

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.02

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.1

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:7.5.0

Trust: 0.3

vendor:hpmodel:xp7 global link manager softwarescope:eqversion:7.6.0-02

Trust: 0.3

vendor:junipermodel:secure analytics 2014.2r2scope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.01

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.09

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:1.0.21

Trust: 0.3

vendor:hitachimodel:raplication manager software (linux(susescope:neversion:8.0.0-06

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:eqversion:1.1.115

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2.2

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.19

Trust: 0.3

vendor:liferaymodel:portal 6.2.1-ce-ga2-securitscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.5.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:8.2

Trust: 0.3

vendor:f5model:big-ip edge gateway hf1scope:eqversion:10.2.1

Trust: 0.3

vendor:oraclemodel:fusion middlewarescope:eqversion:11.1.21.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.0

Trust: 0.3

vendor:apachemodel:strutsscope:neversion:2.3.16.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.25

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:8.4

Trust: 0.3

vendor:ibmmodel:leadsscope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.3.0.2.0

Trust: 0.3

vendor:ibmmodel:infosphere balanced warehouse d5100scope: - version: -

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.6.1-05

Trust: 0.3

vendor:junipermodel:security threat response manager 2013.2r8scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.2

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.3

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.08

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:15.2

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.401

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.0.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.5.0

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:7.0-00

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.6.1-05

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0.3

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:8.6

Trust: 0.3

vendor:oraclemodel:knowledgescope:eqversion:8.6.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.2

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:hitachimodel:raplication manager software (solaris(x6scope:eqversion:7.6.1-05

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:3.0.1.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:eqversion:6.3.0

Trust: 0.3

vendor:ibmmodel:security siteprotector systemscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:infosphere mashuphubscope:eqversion:2.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.04

Trust: 0.3

vendor:hpmodel:device managerscope:eqversion:8.0.0-00

Trust: 0.3

vendor:hitachimodel:raplication manager softwarescope:eqversion:7.6.1-05

Trust: 0.3

vendor:hitachimodel:global link manager software (solaris(x6scope:eqversion:7.6.1-01

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.3-00

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-11-07

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:ibmmodel:security siteprotector systemscope:eqversion:3.1

Trust: 0.3

vendor:hpmodel:device managerscope:eqversion:8.0.0-06

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:5.5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.01

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:9.0

Trust: 0.3

vendor:oraclemodel:identity managerscope:eqversion:11.1.22

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.5.0-02

Trust: 0.3

vendor:oraclemodel:weblogic portalscope:eqversion:10.3.6.0

Trust: 0.3

vendor:oraclemodel:retail clearance optimization enginescope:eqversion:14.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.2

Trust: 0.3

vendor:hpmodel:sitescope monitors 11.32ip1scope: - version: -

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:2.0.1.1

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.13

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:neversion:8.0.0-06

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.11

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:websphere service registry and repositoryscope:eqversion:6.3

Trust: 0.3

vendor:hitachimodel:tuning manager software (linux(rhelscope:eqversion:7.6.1-05

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.2

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.22

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.1

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:ibmmodel:infosphere balanced warehouse c3000scope: - version: -

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:8.0.0-05

Trust: 0.3

vendor:ibmmodel:tivoli netcool configuration managerscope:eqversion:6.4.1

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.1

Trust: 0.3

vendor:oraclemodel:jdeveloperscope:eqversion:11.1.17.0

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.1.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for application diagnosticsscope:eqversion:7.1

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.4

Trust: 0.3

vendor:ibmmodel:websphere service registry and repositoryscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.3

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.12

Trust: 0.3

vendor:ibmmodel:contact optimizationscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(susescope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.11

Trust: 0.3

vendor:oraclemodel:retail markdown optimizationscope:eqversion:12.0

Trust: 0.3

vendor:hpmodel:xp p9000 tiered storage managerscope:eqversion:7.6.1-06

Trust: 0.3

vendor:ibmmodel:content analytics with enterprise searchscope:eqversion:3.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.3-00

Trust: 0.3

vendor:hpmodel:icewall configuration managerscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.02

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.1.1

Trust: 0.3

vendor:oraclemodel:enterprise data qualityscope:eqversion:9.0.11

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:16.1

Trust: 0.3

vendor:ibmmodel:tivoli netcool/omnibus web guiscope:eqversion:7.3.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(susescope:neversion:8.0.0-06

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-01

Trust: 0.3

vendor:hpmodel:xp7 global link manager softwarescope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:7.5.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.51

Trust: 0.3

vendor:oraclemodel:identity managerscope:eqversion:11.1.1.7

Trust: 0.3

vendor:hitachimodel:tuning manager software (linux(susescope:eqversion:8.0.0-05

Trust: 0.3

vendor:hitachimodel:tiered storage manager software -00scope:eqversion:7.1.1

Trust: 0.3

vendor:oraclemodel:weblogic portalscope:eqversion:10.2.1.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:eqversion:1.1

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-03(x64))

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:20500

Trust: 0.3

vendor:ibmmodel:websphere service registry and repositoryscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:records managerscope:eqversion:8.4

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:8.0.0-00

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.0

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.5.0.1

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-00-03

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0.1

Trust: 0.3

vendor:hitachimodel:tuning manager software (linux(rhelscope:neversion:8.0.0-06

Trust: 0.3

vendor:ibmmodel:tivoli storage manager administration centerscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.2

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-00(x64))

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-01

Trust: 0.3

vendor:ibmmodel:websphere service registry and repositoryscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:7.5.1.2

Trust: 0.3

vendor:ibmmodel:websphere enterprise service busscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:2.5.0.2

Trust: 0.3

vendor:ibmmodel:infosphere master data management collaborative editionscope:eqversion:-10.1

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.2.0.2.0

Trust: 0.3

vendor:hpmodel:xp p9000 replication managerscope:eqversion:8.0.0-00

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:12.1

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:2.5.0.3

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:3.0.1.1

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.0.1.2

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:0

Trust: 0.3

vendor:hpmodel:xp p9000 replication managerscope:eqversion:8.0.0-06

Trust: 0.3

vendor:ibmmodel:omnifind enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.10

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:57100

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:eqversion:1.1.114

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:8.4.1

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.0.1.1

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.3

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.5.0-02

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.2.1

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10-03

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.2

Trust: 0.3

vendor:ibmmodel:security identity managerscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.5

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:device manager software (linux(susescope:eqversion:7.6.1-05

Trust: 0.3

vendor:ibmmodel:security qradarscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:7.5

Trust: 0.3

vendor:hpmodel:sitescope monitorsscope:eqversion:11.20

Trust: 0.3

vendor:junipermodel:secure analyticsscope:eqversion:2012.1

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.5.5

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.0.1

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.2

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.52

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-00-02

Trust: 0.3

vendor:ibmmodel:content manager records enablerscope:eqversion:8.4

Trust: 0.3

vendor:oraclemodel:retail invoice matching 12.0inscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.4

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.5.1

Trust: 0.3

vendor:oraclemodel:knowledgescope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:infosphere master data management server for product informationscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-02(x64))

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.6

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.1

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:14.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:ibmmodel:security qradarscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:rational insight ifix1scope:eqversion:1.0.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:ibmmodel:ds8870scope:eqversion:7.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:8.0.0-00

Trust: 0.3

vendor:redhatmodel:jboss fusescope:eqversion:6.1.0

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:websphere partner gateway enterprise editionscope:eqversion:6.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.2

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.3

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.53

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.6.1-05

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.34

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.1

Trust: 0.3

vendor:hitachimodel:global link manager software (linux(rhelscope:eqversion:8.0.0-00

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.4

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.2.0.1.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:8.0.0-05

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:ds8870scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.4

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:8.5

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:websphere enterprise service busscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.001

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2143

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.12

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.402

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2.1

Trust: 0.3

vendor:hpmodel:xp p9000 replication managerscope:eqversion:7.6.1-06

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(x6scope:eqversion:7.6.1-05

Trust: 0.3

vendor:oraclemodel:real-time decision serverscope:eqversion:11.1.1.7

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:9.0

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:11.0

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.1-00

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:14.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.37

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(spscope:eqversion:7.6.1-05

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf3scope:eqversion:11.2

Trust: 0.3

vendor:ibmmodel:openpagesscope:eqversion:6.1.0.1

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.4

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.1

Trust: 0.3

vendor:hpmodel:sitescopescope:eqversion:11.21

Trust: 0.3

vendor:oraclemodel:retail markdown optimizationscope:eqversion:13.4

Trust: 0.3

vendor:ibmmodel:leadsscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.6

Trust: 0.3

vendor:hpmodel:sitescopescope:neversion:11.24.271

Trust: 0.3

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software )scope:eqversion:7.0-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(susescope:eqversion:8.0.0-05

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.1

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:8.0.0-00

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for softwarescope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:global link manager software (linux(susescope:eqversion:8.0.0-00

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.1.3

Trust: 0.3

vendor:redhatmodel:network satellite server (for rhelscope:eqversion:6)5.6

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:56002

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:content navigatorscope:eqversion:2.0.2

Trust: 0.3

vendor:ibmmodel:infosphere identity insightscope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:13.1

Trust: 0.3

vendor:hitachimodel:raplication manager software (linux(rhelscope:eqversion:7.6.1-05

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:76000

Trust: 0.3

vendor:ibmmodel:tivoli netcool/omnibus web guiscope:eqversion:7.3

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:oraclemodel:retail clearance optimization enginescope:eqversion:13.3

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:12.0

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:3.0.1

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:junipermodel:security threat response manager 2012.1r7scope:neversion: -

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.4

Trust: 0.3

vendor:hitachimodel:global link manager software (linux(rhelscope:neversion:8.0.0-01

Trust: 0.3

vendor:junipermodel:security threat response managerscope:eqversion:2013.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:13.0

Trust: 0.3

vendor:ntt datamodel:terasoluna server framework for javascope:eqversion:2.01

Trust: 0.3

vendor:oraclemodel:identity managerscope:eqversion:11.1.21.0

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.2.0-00

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.3.1

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:tuning manager software (linux(rhelscope:eqversion:8.0.0-05

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.4-00

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1

Trust: 0.3

vendor:hpmodel:xp p9000 replication managerscope:eqversion:5.0.0-00

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:3.00

Trust: 0.3

vendor:hpmodel:sitescopescope:neversion:11.13

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:16.2

Trust: 0.3

vendor:oraclemodel:fusion middlewarescope:eqversion:11.1.1.5.0

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:2.5.0.1

Trust: 0.3

vendor:oraclemodel:enterprise data qualityscope:eqversion:8.1.2

Trust: 0.3

vendor:ibmmodel:predictive insightscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:jdeveloperscope:eqversion:12.1.20.0

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:9.1.2.0

Trust: 0.3

vendor:oraclemodel:jdeveloperscope:eqversion:12.1.30

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.3

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.0

Trust: 0.3

vendor:oraclemodel:insurance ifrs analyzerscope:eqversion:178.0.6

Trust: 0.3

vendor:oraclemodel:fusion middlewarescope:eqversion:11.1.22.0

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.1.3.0

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.2.2

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.2

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(spscope:eqversion:6.4.0-03

Trust: 0.3

vendor:ibmmodel:websphere service registry and repositoryscope:eqversion:7.5

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50-09

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:10500

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.0

Trust: 0.3

vendor:oraclemodel:retail allocationscope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:retail central office 12.0.9inscope: - version: -

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.1.0.2.0

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:77000

Trust: 0.3

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.1

Trust: 0.3

vendor:hitachimodel:global link manager software (solaris(spscope:eqversion:7.6.1-01

Trust: 0.3

vendor:ibmmodel:websphere partner gateway express editionscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:global link manager software (linux(susescope:neversion:8.0.0-01

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-10

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.0.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2.145

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.010

Trust: 0.3

vendor:hitachimodel:raplication manager software (linux(rhelscope:neversion:8.0.0-06

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.5.1

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.0.2

Trust: 0.3

vendor:hitachimodel:raplication manager software (solaris(spscope:eqversion:7.6.1-05

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.13

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.1

Trust: 0.3

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:oraclemodel:retail markdown optimizationscope:eqversion:13.2

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:7.5.1.1

Trust: 0.3

vendor:ibmmodel:infosphere mashuphubscope:eqversion:3.0

Trust: 0.3

vendor:vmwaremodel:vcenter server updatescope:neversion:5.52

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:tivoli provisioning managerscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.021

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2.1

Trust: 0.3

vendor:hpmodel:device managerscope:eqversion:7.6.1-06

Trust: 0.3

vendor:oraclemodel:retail allocationscope:eqversion:11.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:contact optimizationscope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-00(x64))

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-00

Trust: 0.3

vendor:susemodel:managerscope:eqversion:111.7

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-01

Trust: 0.3

vendor:ibmmodel:websphere enterprise service busscope:eqversion:7.5

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(spscope:eqversion:7.4.0-02

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:7.6.1-01

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.2.1-00

Trust: 0.3

vendor:f5model:big-ip edge gateway hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:ibmmodel:tivoli provisioning managerscope:eqversion:7.2

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.3

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.2-00(x64))

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:ibmmodel:web interface for content managementscope:eqversion:1.0.4

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1-03

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.1.20

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(spscope:eqversion:7.4.0-01

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.3.60

Trust: 0.3

vendor:ibmmodel:lotus quickr for websphere portalscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.0.0

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-02

Trust: 0.3

vendor:oraclemodel:retail allocationscope:eqversion:13.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:8.0.4

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:contact optimizationscope:eqversion:7.0

Trust: 0.3

sources: BID: 67121 // JVNDB: JVNDB-2014-000056 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0114
value: HIGH

Trust: 1.0

IPA: JVNDB-2014-000056
value: HIGH

Trust: 0.8

NVD: CVE-2014-0114
value: HIGH

Trust: 0.8

VULMON: CVE-2014-0114
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0114
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

IPA: JVNDB-2014-000056
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: VULMON: CVE-2014-0114 // JVNDB: JVNDB-2014-000056 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

problemtype:Incorrect input confirmation (CWE-20) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2014-000056 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

THREAT TYPE

remote

Trust: 0.4

sources: PACKETSTORM: 126618 // PACKETSTORM: 126692 // PACKETSTORM: 137980 // PACKETSTORM: 126620

TYPE

Design Error

Trust: 0.3

sources: BID: 67121

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-000056

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-0114

PATCH

title:BEANUTILS-463url:https://issues.apache.org/jira/browse/BEANUTILS-463

Trust: 1.6

title:Commons BeanUtils Package Version 1.9.2 Release Notesurl:http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt

Trust: 0.8

title:Impact of CVE-2014-0094 / CVE-2014-0114url:http://software.fujitsu.com/jp/security/vulnerabilities/cve2014-0094-0114.html

Trust: 0.8

title:Interstage Business Application Server, Interstage Application Server, Interstage Apworks, Interstage Studio, Interstage Application Framework Suite, Interstage Job Workload Server, Interstage Service Integrator: vulnerability in Struts (CVE-2014-0114)url:http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_bas_201401.html

Trust: 0.8

title:Interstage Navigator Explorer Server: vulnerability in Struts (CVE-2014-0114)url:http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_nes201401.html

Trust: 0.8

title:HS14-018url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-018/index.html

Trust: 0.8

title:HS14-020url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-020/index.html

Trust: 0.8

title:1676303url:http://www-01.ibm.com/support/docview.wss?uid=swg21676303

Trust: 0.8

title:1676375url:http://www-01.ibm.com/support/docview.wss?uid=swg21676375

Trust: 0.8

title:1676931url:http://www-01.ibm.com/support/docview.wss?uid=swg21676931

Trust: 0.8

title:1675523url:http://www-01.ibm.com/support/docview.wss?uid=swg21675523

Trust: 0.8

title:1678621url:http://www-01.ibm.com/support/docview.wss?uid=swg21678621

Trust: 0.8

title:1680848url:http://www-01.ibm.com/support/docview.wss?uid=swg21680848

Trust: 0.8

title:1680194url:http://www-01.ibm.com/support/docview.wss?uid=swg21680194

Trust: 0.8

title:NTT DATA Corporation websiteurl:http://www.nttdata.com/global/en/news-center/others/2014/052300.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - October 2014 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpuoct2014verbose-1972962.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - October 2014url:http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - January 2015url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - January 2015 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - July 2014url:http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - July 2014 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujul2014verbose-1972958.html

Trust: 0.8

title:Does CVE-2014-0114 affect Struts 1 in Red Hat products?url:https://access.redhat.com/solutions/869353

Trust: 0.8

title:Bug 1116665url:https://bugzilla.redhat.com/show_bug.cgi?id=1116665

Trust: 0.8

title:Bug 1091938url:https://bugzilla.redhat.com/show_bug.cgi?id=1091938

Trust: 0.8

title:July 2014 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/july_2014_critical_patch_update

Trust: 0.8

title:October 2014 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/october_2014_critical_patch_update

Trust: 0.8

title:January 2015 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/january_2015_critical_patch_update

Trust: 0.8

title:TERASOLUNA Frameworkurl:http://en.sourceforge.jp/projects/terasoluna/

Trust: 0.8

title:Apache Struts 1.2.9 with SP1 by NTT DATAurl:http://en.sourceforge.jp/projects/terasoluna/wiki/StrutsPatch1-EN

Trust: 0.8

title:Red Hat: Important: Red Hat A-MQ Broker 7.5 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192995 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: libstruts1.2-java: CVE-2014-0114url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=96f4091aa31a0ece729fdcb110066df5

Trust: 0.1

title:Red Hat: CVE-2014-0114url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0114

Trust: 0.1

title:Red Hat: Important: Fuse 7.1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182669 - Security Advisory

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been fixed in IBM Security Privileged Identity Manager Appliance.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=f5bb2b180c7c77e5a02747a1f31830d9

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=f655264a6935505d167bbf45f409a57b

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=81c63752a6f26433af2128b2e8c02385

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a

Trust: 0.1

title:IBM: Security Bulletin: Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=68c6989b84f14aaac220c13b754c7702

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=5f8c525f1408011628af1792207b2099

Trust: 0.1

title:struts1-patchurl:https://github.com/ricedu/struts1-patch

Trust: 0.1

title: - url:https://github.com/weblegacy/struts1

Trust: 0.1

title:struts1filterurl:https://github.com/rgielen/struts1filter

Trust: 0.1

title:StrutsExampleurl:https://github.com/vikasvns2000/StrutsExample

Trust: 0.1

title:struts-miniurl:https://github.com/bingcai/struts-mini

Trust: 0.1

title:strutt-cve-2014-0114url:https://github.com/anob3it/strutt-cve-2014-0114

Trust: 0.1

title:super-pomurl:https://github.com/ian4hu/super-pom

Trust: 0.1

sources: VULMON: CVE-2014-0114 // JVNDB: JVNDB-2014-000056 // JVNDB: JVNDB-2014-002308

EXTERNAL IDS

db:NVDid:CVE-2014-0114

Trust: 3.9

db:JVNDBid:JVNDB-2014-002308

Trust: 1.6

db:JVNDBid:JVNDB-2014-000056

Trust: 1.6

db:BIDid:67121

Trust: 1.3

db:JVNid:JVN30962312

Trust: 1.1

db:SECUNIAid:59479

Trust: 1.0

db:SECUNIAid:59464

Trust: 1.0

db:SECUNIAid:60177

Trust: 1.0

db:SECUNIAid:60703

Trust: 1.0

db:SECUNIAid:59245

Trust: 1.0

db:SECUNIAid:59718

Trust: 1.0

db:SECUNIAid:59430

Trust: 1.0

db:SECUNIAid:57477

Trust: 1.0

db:SECUNIAid:58947

Trust: 1.0

db:SECUNIAid:59246

Trust: 1.0

db:SECUNIAid:58710

Trust: 1.0

db:SECUNIAid:59704

Trust: 1.0

db:SECUNIAid:58851

Trust: 1.0

db:SECUNIAid:59480

Trust: 1.0

db:SECUNIAid:59228

Trust: 1.0

db:SECUNIAid:59118

Trust: 1.0

db:SECUNIAid:59014

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2014/07/08/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2014/06/15/10

Trust: 1.0

db:ICS CERTid:ICSMA-20-184-01

Trust: 0.8

db:HITACHIid:HS14-018

Trust: 0.3

db:HITACHIid:HS14-020

Trust: 0.3

db:JUNIPERid:JSA10643

Trust: 0.3

db:VULMONid:CVE-2014-0114

Trust: 0.1

db:PACKETSTORMid:126618

Trust: 0.1

db:PACKETSTORMid:149311

Trust: 0.1

db:PACKETSTORMid:126392

Trust: 0.1

db:PACKETSTORMid:126692

Trust: 0.1

db:PACKETSTORMid:127957

Trust: 0.1

db:PACKETSTORMid:127868

Trust: 0.1

db:PACKETSTORMid:137980

Trust: 0.1

db:PACKETSTORMid:126620

Trust: 0.1

db:PACKETSTORMid:126455

Trust: 0.1

sources: VULMON: CVE-2014-0114 // BID: 67121 // JVNDB: JVNDB-2014-000056 // JVNDB: JVNDB-2014-002308 // PACKETSTORM: 126618 // PACKETSTORM: 149311 // PACKETSTORM: 126392 // PACKETSTORM: 126692 // PACKETSTORM: 127957 // PACKETSTORM: 127868 // PACKETSTORM: 137980 // PACKETSTORM: 126620 // PACKETSTORM: 126455 // NVD: CVE-2014-0114

REFERENCES

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0114

Trust: 1.6

url:http://www.vmware.com/security/advisories/vmsa-2014-0008.html

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042296

Trust: 1.3

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.3

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Trust: 1.3

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

Trust: 1.3

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676303

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675266

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676110

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677110

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675689

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674812

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674128

Trust: 1.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675972

Trust: 1.3

url:http://jvn.jp/en/jp/jvn30962312/index.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2018:2669

Trust: 1.1

url:http://advisories.mageia.org/mgasa-2014-0219.html

Trust: 1.1

url:https://security.gentoo.org/glsa/201607-09

Trust: 1.1

url:http://apache-ignite-developers.2346864.n4.nabble.com/cve-2014-0114-apache-ignite-is-vulnerable-to-existing-cve-2014-0114-td31205.html

Trust: 1.0

url:http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/release-notes.txt

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136958.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=140119284401582&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=140801096002766&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141451023707502&w=2

Trust: 1.0

url:http://openwall.com/lists/oss-security/2014/06/15/10

Trust: 1.0

url:http://openwall.com/lists/oss-security/2014/07/08/1

Trust: 1.0

url:http://seclists.org/fulldisclosure/2014/dec/23

Trust: 1.0

url:http://secunia.com/advisories/57477

Trust: 1.0

url:http://secunia.com/advisories/58710

Trust: 1.0

url:http://secunia.com/advisories/58851

Trust: 1.0

url:http://secunia.com/advisories/58947

Trust: 1.0

url:http://secunia.com/advisories/59014

Trust: 1.0

url:http://secunia.com/advisories/59118

Trust: 1.0

url:http://secunia.com/advisories/59228

Trust: 1.0

url:http://secunia.com/advisories/59245

Trust: 1.0

url:http://secunia.com/advisories/59246

Trust: 1.0

url:http://secunia.com/advisories/59430

Trust: 1.0

url:http://secunia.com/advisories/59464

Trust: 1.0

url:http://secunia.com/advisories/59479

Trust: 1.0

url:http://secunia.com/advisories/59480

Trust: 1.0

url:http://secunia.com/advisories/59704

Trust: 1.0

url:http://secunia.com/advisories/59718

Trust: 1.0

url:http://secunia.com/advisories/60177

Trust: 1.0

url:http://secunia.com/advisories/60703

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675387

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675898

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676091

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676375

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676931

Trust: 1.0

url:http://www.debian.org/security/2014/dsa-2940

Trust: 1.0

url:http://www.ibm.com/support/docview.wss?uid=swg21675496

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2014:095

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/534161/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/bid/67121

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2014-0012.html

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2019:2995

Trust: 1.0

url:https://access.redhat.com/solutions/869353

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=1091938

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=1116665

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05324755

Trust: 1.0

url:https://issues.apache.org/jira/browse/beanutils-463

Trust: 1.0

url:https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3cuser.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3ccommits.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3ccommits.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3cdevnull.infra.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3cdev.drill.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3csolr-user.lucene.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3cannounce.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3ccommits.druid.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3cdev.drill.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3ccommits.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3ccommits.pulsar.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3cgitbox.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3cnotifications.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3cissues.drill.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3cnotifications.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3csolr-user.lucene.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3ccommits.dolphinscheduler.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3csolr-user.lucene.apache.org%3e

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20140911-0001/

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20180629-0006/

Trust: 1.0

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0114

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2014-0114

Trust: 0.9

url:http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-002308.html

Trust: 0.8

url:http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-000056.html

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsma-20-184-01

Trust: 0.8

url:https://rhn.redhat.com/errata/rhsa-2014-0497.html

Trust: 0.7

url:http://struts.apache.org/release/2.3.x/docs/s2-021.html

Trust: 0.5

url:https://rhn.redhat.com/errata/rhsa-2014-0500.html

Trust: 0.4

url:http://www.liferay.com/community/security-team/known-vulnerabilities/-/asset_publisher/t8ei/content/cst-sa-lps-46552-struts-1-classloader-manipulation

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10643&cat=sirt_1&actp=list

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674435

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674428

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674937

Trust: 0.3

url:http://struts.apache.org/

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04311273

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675822

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673663

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-018/index.html

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21672316

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676375

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673098

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673944

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673101

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0498.html

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04399728

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04473828

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05324755

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv61061

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21680848

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676646

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042186

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042185

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042184

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv61039

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv61058

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037507

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678830

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-020/index.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037825

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037409

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037506

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004807

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673757

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673508

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673695

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674099

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674104

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673992

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674110

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673982

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673422

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678359

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680716

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21675387

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21677802

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674310

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674379

Trust: 0.3

url:www-01.ibm.com/support/docview.wss?uid=swg21677335

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674191

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674017

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674016

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674339

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677449

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675496

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676485

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21677298

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674613

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676091

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673878

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673877

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674113

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674905

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21679331

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680698

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037424

Trust: 0.3

url:http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15282.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680194

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677352

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037622

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://www.redhat.com/security/data/cve/cve-2014-0114.html

Trust: 0.2

url:http://twitter.com/rgielen

Trust: 0.2

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.fuse&downloadtype=securitypatches&version=6.1.0

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-0114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000342

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000352

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000346

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5397

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14063

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000343

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1338

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-14063

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000342

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000352

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000346

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000339

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000340

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000341

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.1/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000343

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8036

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000345

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000338

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1272

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.fuse&downloadtype=distributions&version=7.1.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000340

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000338

Trust: 0.1

url:https://access.redhat.com/articles/2939351

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000339

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8036

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8088

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5397

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1338

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000344

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000345

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00321

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00320

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00322

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00324

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00318

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00319

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00316

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00315

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00323

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00317

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0114

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://access.redhat.com/site/articles/11258

Trust: 0.1

url:http://struts.apache.org/struts1eol-announcement.html

Trust: 0.1

url:http://h30499.www3.hp.com/t5/hp-security-research-blog/protect-your-struts1-applications/ba-p/6463188#.u2j7xeasxro

Trust: 0.1

sources: BID: 67121 // JVNDB: JVNDB-2014-000056 // JVNDB: JVNDB-2014-002308 // PACKETSTORM: 126618 // PACKETSTORM: 149311 // PACKETSTORM: 126392 // PACKETSTORM: 126692 // PACKETSTORM: 127957 // PACKETSTORM: 127868 // PACKETSTORM: 137980 // PACKETSTORM: 126620 // PACKETSTORM: 126455 // NVD: CVE-2014-0114

CREDITS

Rene Gielen

Trust: 0.5

sources: BID: 67121 // PACKETSTORM: 126392 // PACKETSTORM: 126455

SOURCES

db:VULMONid:CVE-2014-0114
db:BIDid:67121
db:JVNDBid:JVNDB-2014-000056
db:JVNDBid:JVNDB-2014-002308
db:PACKETSTORMid:126618
db:PACKETSTORMid:149311
db:PACKETSTORMid:126392
db:PACKETSTORMid:126692
db:PACKETSTORMid:127957
db:PACKETSTORMid:127868
db:PACKETSTORMid:137980
db:PACKETSTORMid:126620
db:PACKETSTORMid:126455
db:NVDid:CVE-2014-0114

LAST UPDATE DATE

2024-11-16T21:02:57.813000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-0114date:2023-02-13T00:00:00
db:BIDid:67121date:2019-07-17T07:00:00
db:JVNDBid:JVNDB-2014-000056date:2015-01-22T00:00:00
db:JVNDBid:JVNDB-2014-002308date:2020-09-02T00:00:00
db:NVDid:CVE-2014-0114date:2023-02-13T00:32:29.660

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-0114date:2014-04-30T00:00:00
db:BIDid:67121date:2014-04-29T00:00:00
db:JVNDBid:JVNDB-2014-000056date:2014-06-17T00:00:00
db:JVNDBid:JVNDB-2014-002308date:2014-05-01T00:00:00
db:PACKETSTORMid:126618date:2014-05-14T19:24:00
db:PACKETSTORMid:149311date:2018-09-11T15:41:48
db:PACKETSTORMid:126392date:2014-04-29T22:47:52
db:PACKETSTORMid:126692date:2014-05-19T03:19:48
db:PACKETSTORMid:127957date:2014-08-21T19:34:50
db:PACKETSTORMid:127868date:2014-08-14T22:49:43
db:PACKETSTORMid:137980date:2016-07-20T18:29:00
db:PACKETSTORMid:126620date:2014-05-14T19:26:00
db:PACKETSTORMid:126455date:2014-05-03T02:09:52
db:NVDid:CVE-2014-0114date:2014-04-30T10:49:03.973