ID

VAR-201404-0381


CVE

CVE-2014-0460


TITLE

Oracle Java SE/JRockit/Java SE Embedded Security hole

Trust: 0.6

sources: CNNVD: CNNVD-201404-275

DESCRIPTION

Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI. The vulnerability can be exploited over multiple protocols. This issue affects the 'JNDI' sub-component. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.6.0-openjdk security and bug fix update Advisory ID: RHSA-2014:0408-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0408.html Issue date: 2014-04-16 CVE Names: CVE-2014-0429 CVE-2014-0446 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2403 CVE-2014-2412 CVE-2014-2414 CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 ===================================================================== 1. Summary: Updated java-1.6.0-openjdk packages that fix various security issues and one bug are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429) Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421) Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0461) Multiple improper permission check issues were discovered in the AWT, JAX-WS, JAXB, Libraries, and Sound components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-0446, CVE-2014-2427) Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460) It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403) It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453) It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398) An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876) This update also fixes the following bug: * The OpenJDK update to IcedTea version 1.13 introduced a regression related to the handling of the jdk_version_info variable. This variable was not properly zeroed out before being passed to the Java Virtual Machine, resulting in a memory leak in the java.lang.ref.Finalizer class. This update fixes this issue, and memory leaks no longer occur. (BZ#1085373) All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1085373 - java.lang.ref.Finalizer leak when upgrading from 1.62 to 1.66 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTTm2zXlSAg2UNWIIRAkZ8AJ4tQFSY3KSdfOiDJA5KJWO9IJa1BACeMLJ6 PQHHIgiQ5K7Q4/GEJAHNU94= =9aj6 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - x86_64 3. Note that the CVE-2014-0459 issue is in the lcms2 library, which has been patched to correct this flaw. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTdfckmqjQ0CJFipgRArKEAKCIiAR2WkLo3Vb0gzzQ5RDz7hQZ3gCcDC6A 5xOtKkhOvonpLXoqBiAcXWQ= =qBk5 -----END PGP SIGNATURE----- . Release Date: 2014-08-19 Last Updated: 2014-08-19 Potential Security Impact: Remote unauthorized access, disclosure of information, and other vulnerabilities Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities. References: CVE-2013-6629 CVE-2013-6954 CVE-2014-0432 CVE-2014-0446 CVE-2014-0448 CVE-2014-0449 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454 CVE-2014-0455 CVE-2014-0456 CVE-2014-0458 CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2401 CVE-2014-2402 CVE-2014-2403 CVE-2014-2409 CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2420 CVE-2014-2421 CVE-2014-2422 CVE-2014-2423 CVE-2014-2427 CVE-2014-2428 CVE-2014-2483 CVE-2014-2490 CVE-2014-4208 CVE-2014-4209 CVE-2014-4216 CVE-2014-4218 CVE-2014-4220 CVE-2014-4221 CVE-2014-4223 CVE-2014-4244 CVE-2014-4252 CVE-2014-4262 CVE-2014-4263 CVE-2014-4264 CVE-2014-4265 CVE-2014-4266 CVE-2014-4268 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, and B.11.31 running HP JDK and JRE v7.0.09 and earlier. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-6629 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2013-6954 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-0432 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-0446 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0448 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2014-0449 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2014-0451 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0452 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0453 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2014-0454 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0455 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-0456 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-0458 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-0459 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0460 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8 CVE-2014-0461 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-1876 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4 CVE-2014-2397 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-2398 (AV:N/AC:M/Au:S/C:N/I:P/A:N) 3.5 CVE-2014-2401 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-2402 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2403 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2014-2409 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2014-2412 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2413 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-2414 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2420 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2014-2421 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-2422 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-2423 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2427 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2428 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2014-2483 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-2490 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4208 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2014-4209 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2014-4216 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4218 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4220 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4221 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-4223 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4244 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2014-4252 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2014-4262 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2014-4263 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2014-4264 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-4265 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4266 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-4268 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following Java version upgrade to resolve these vulnerabilities. The upgrade is available from the following location: http://www.hp.com/java OS Version Release Version Depot Name HP-UX B.11.23, B.11.31 JDK and JRE v7.0.10 or subsequent Itanium_JDK_JRE_7.0.10_Aug_2014_Java70_1.7.0.10.00_HP-UX_B.11.31_IA.depot MANUAL ACTIONS: Yes - Update For Java v7.0 update to Java v7.0.10 or subsequent PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.23 HP-UX B.11.31 =========== Jdk70.JDK70-COM Jdk70.JDK70-DEMO Jdk70.JDK70-IPF32 Jdk70.JDK70-IPF64 Jre70.JRE70-COM Jre70.JRE70-IPF32 Jre70.JRE70-IPF32-HS Jre70.JRE70-IPF64 Jre70.JRE70-IPF64-HS action: install revision 1.7.0.10.00 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 19 August 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Java SE (Java Platform Standard Edition) is used to develop and deploy Java applications on desktops, servers, and embedded devices and real-time environments; JRockit is a Java virtual machine built into Oracle Fusion Middleware; Java SE Embedded is a The Java platform for developing powerful, reliable, and portable applications for embedded systems. 7) - noarch, x86_64 3. ============================================================================ Ubuntu Security Notice USN-2191-1 May 01, 2014 openjdk-6 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in OpenJDK 6. An attacker could exploit these to cause a denial of service or expose sensitive data over the network. An attacker could exploit these to expose sensitive data over the network. (CVE-2014-0453, CVE-2014-0460) A vulnerability was discovered in the OpenJDK JRE related to availability. An attacker could exploit this to cause a denial of service. (CVE-2014-0459) Jakub Wilk discovered that the OpenJDK JRE incorrectly handled temporary files. In the default installation of Ubuntu, this should be prevented by the Yama link restrictions. (CVE-2014-1876) A vulnerability was discovered in the OpenJDK JRE related to data integrity. (CVE-2014-2398) A vulnerability was discovered in the OpenJDK JRE related to information disclosure. An attacker could exploit this to expose sensitive data over the network. (CVE-2014-2403) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: icedtea-6-jre-cacao 6b31-1.13.3-1ubuntu1~0.12.04.2 icedtea-6-jre-jamvm 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre-headless 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre-lib 6b31-1.13.3-1ubuntu1~0.12.04.2 openjdk-6-jre-zero 6b31-1.13.3-1ubuntu1~0.12.04.2 Ubuntu 10.04 LTS: icedtea-6-jre-cacao 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre-headless 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre-lib 6b31-1.13.3-1ubuntu1~0.10.04.1 openjdk-6-jre-zero 6b31-1.13.3-1ubuntu1~0.10.04.1 This update uses a new upstream release, which includes additional bug fixes. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201502-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Oracle JRE/JDK: Multiple vulnerabilities Date: February 15, 2015 Bugs: #507798, #508716, #517220, #525464 ID: 201502-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Oracle's Java SE Development Kit and Runtime Environment, the worst of which could lead to execution of arbitrary code. Please review the CVE identifiers referenced below for details. Impact ====== A context-dependent attacker may be able to execute arbitrary code, disclose, update, insert, or delete certain data. Workaround ========== There is no known workaround at this time. Resolution ========== All Oracle JRE 1.7 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jre-bin-1.7.0.71" All Oracle JDK 1.7 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jdk-bin-1.7.0.71" All users of the precompiled 32-bit Oracle JRE should upgrade to the latest version: # emerge --sync # emerge -a -1 -v ">=app-emulation/emul-linux-x86-java-1.7.0.71" References ========== [ 1 ] CVE-2014-0429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429 [ 2 ] CVE-2014-0432 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0432 [ 3 ] CVE-2014-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446 [ 4 ] CVE-2014-0448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0448 [ 5 ] CVE-2014-0449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0449 [ 6 ] CVE-2014-0451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451 [ 7 ] CVE-2014-0452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452 [ 8 ] CVE-2014-0453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453 [ 9 ] CVE-2014-0454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0454 [ 10 ] CVE-2014-0455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0455 [ 11 ] CVE-2014-0456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456 [ 12 ] CVE-2014-0457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457 [ 13 ] CVE-2014-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458 [ 14 ] CVE-2014-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459 [ 15 ] CVE-2014-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460 [ 16 ] CVE-2014-0461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461 [ 17 ] CVE-2014-0463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0463 [ 18 ] CVE-2014-0464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0464 [ 19 ] CVE-2014-2397 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397 [ 20 ] CVE-2014-2398 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398 [ 21 ] CVE-2014-2401 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2401 [ 22 ] CVE-2014-2402 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2402 [ 23 ] CVE-2014-2403 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403 [ 24 ] CVE-2014-2409 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2409 [ 25 ] CVE-2014-2410 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2410 [ 26 ] CVE-2014-2412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412 [ 27 ] CVE-2014-2413 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2413 [ 28 ] CVE-2014-2414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414 [ 29 ] CVE-2014-2420 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2420 [ 30 ] CVE-2014-2421 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421 [ 31 ] CVE-2014-2422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2422 [ 32 ] CVE-2014-2423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423 [ 33 ] CVE-2014-2427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427 [ 34 ] CVE-2014-2428 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2428 [ 35 ] CVE-2014-2483 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2483 [ 36 ] CVE-2014-2490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2490 [ 37 ] CVE-2014-4208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4208 [ 38 ] CVE-2014-4209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4209 [ 39 ] CVE-2014-4216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4216 [ 40 ] CVE-2014-4218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4218 [ 41 ] CVE-2014-4219 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4219 [ 42 ] CVE-2014-4220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4220 [ 43 ] CVE-2014-4221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4221 [ 44 ] CVE-2014-4223 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4223 [ 45 ] CVE-2014-4227 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4227 [ 46 ] CVE-2014-4244 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4244 [ 47 ] CVE-2014-4247 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4247 [ 48 ] CVE-2014-4252 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4252 [ 49 ] CVE-2014-4262 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4262 [ 50 ] CVE-2014-4263 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4263 [ 51 ] CVE-2014-4264 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4264 [ 52 ] CVE-2014-4265 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4265 [ 53 ] CVE-2014-4266 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4266 [ 54 ] CVE-2014-4268 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4268 [ 55 ] CVE-2014-4288 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4288 [ 56 ] CVE-2014-6456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6456 [ 57 ] CVE-2014-6457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6457 [ 58 ] CVE-2014-6458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6458 [ 59 ] CVE-2014-6466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6466 [ 60 ] CVE-2014-6468 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6468 [ 61 ] CVE-2014-6476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6476 [ 62 ] CVE-2014-6485 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6485 [ 63 ] CVE-2014-6492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6492 [ 64 ] CVE-2014-6493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6493 [ 65 ] CVE-2014-6502 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6502 [ 66 ] CVE-2014-6503 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6503 [ 67 ] CVE-2014-6504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6504 [ 68 ] CVE-2014-6506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6506 [ 69 ] CVE-2014-6511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6511 [ 70 ] CVE-2014-6512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6512 [ 71 ] CVE-2014-6513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6513 [ 72 ] CVE-2014-6515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6515 [ 73 ] CVE-2014-6517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6517 [ 74 ] CVE-2014-6519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6519 [ 75 ] CVE-2014-6527 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6527 [ 76 ] CVE-2014-6531 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6531 [ 77 ] CVE-2014-6532 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6532 [ 78 ] CVE-2014-6558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6558 [ 79 ] CVE-2014-6562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6562 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201502-12.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . (CVE-2014-1876) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory pages, listed in the References section

Trust: 2.61

sources: NVD: CVE-2014-0460 // BID: 66916 // PACKETSTORM: 126181 // PACKETSTORM: 126631 // PACKETSTORM: 126183 // PACKETSTORM: 127027 // PACKETSTORM: 127939 // PACKETSTORM: 126664 // PACKETSTORM: 127938 // VULHUB: VHN-67953 // VULMON: CVE-2014-0460 // PACKETSTORM: 127041 // PACKETSTORM: 126443 // PACKETSTORM: 127655 // PACKETSTORM: 130400 // PACKETSTORM: 126182 // PACKETSTORM: 126200 // PACKETSTORM: 126195

AFFECTED PRODUCTS

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-50

Trust: 1.5

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-50

Trust: 1.5

vendor:hitachimodel:ucosminexus clientscope:eqversion:06-70

Trust: 1.5

vendor:hitachimodel:cosminexus primary server basescope:eqversion:06-50

Trust: 1.5

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:06-70

Trust: 1.5

vendor:hitachimodel:cosminexus clientscope:eqversion:06-50

Trust: 1.5

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:06-70

Trust: 1.5

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-50

Trust: 1.5

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:06-70

Trust: 1.5

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.3

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-05

Trust: 1.2

vendor:hitachimodel:cosminexus primary server basescope:eqversion:06-00

Trust: 1.2

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-00

Trust: 1.2

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-00

Trust: 1.2

vendor:hitachimodel:cosminexus studioscope:eqversion:05-05

Trust: 1.2

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-00

Trust: 1.2

vendor:hitachimodel:cosminexus developerscope:eqversion:05-05

Trust: 1.2

vendor:hitachimodel:cosminexus clientscope:eqversion:06-00

Trust: 1.2

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:oraclemodel:jrockitscope:eqversion:r28.3.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:13.10

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.5.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:junipermodel:junos spacescope:ltversion:15.1

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.5.0

Trust: 1.0

vendor:oraclemodel:jrockitscope:eqversion:r27.8.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:sunmodel:jre 17scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 8scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 21scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 32scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.5.0 39scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 16scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:07-00

Trust: 0.9

vendor:sunmodel:jdk 05scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 65scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:oraclemodel:jdk 1.5.0 55scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 35scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jre 1.5.0 61scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 03scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 2scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:cosminexus primary server base 06-00-/escope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus developer standard )scope:eqversion:06-70

Trust: 0.9

vendor:oraclemodel:jdk 1.5.0 45scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.5

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 35scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 11scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus developer professional 06-00-/escope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 39scope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 23scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 60scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus client 06-00-/escope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-00-/escope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 51scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 35scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 32scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 45scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus client 06-70-/fscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.5.0 55scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 29scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus service platform messagingscope:eqversion:-07-00

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 28scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.5.0 17scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 7scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-00

Trust: 0.9

vendor:hitachimodel:ucosminexus developer standard 06-70-/fscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 27scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 60scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 03scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 4scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 01scope:eqversion:1.5

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 28scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 26scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 10scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus developer professional for plug-inscope:eqversion:07-00

Trust: 0.9

vendor:hitachimodel:ucosminexus application server smart editionscope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 10scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 45scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 10scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:ucosminexus application server expressscope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 71scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.5.0 36scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:ucosminexus client for plug-inscope:eqversion:07-00

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 26scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 40scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.5.0 61scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-00-/escope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.7

Trust: 0.9

vendor:sunmodel:jre 1.5.0 29scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 43scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 31scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 16scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 30scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 7scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 18scope:eqversion:1.5

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 45scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 11scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 0 10scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 10scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 24scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 33scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 14scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:06-70

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 24scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 32scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 2scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 25scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 24scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 13scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.5.0 41scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 28scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 15scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 9scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 21scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 39scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.6.0 18scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 22scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 32scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 31scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 8scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 21scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.5.0 38scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 37scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus client )scope:eqversion:06-70

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 02scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 28scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 30scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 45scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 51scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 38scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 71scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.5.0 51scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 38scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:07-00

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standard 06-70-/fscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 26scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 40scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 26scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 43scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 30scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standard-rscope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jdk 1.5.0 39scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 18scope:eqversion:1.5

Trust: 0.9

vendor:oraclemodel:jdkscope:eqversion:1.7

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 30scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 02scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 01scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 07scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:06-70

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 12scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.5.0 36scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 13scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 13scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 22scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 35scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 23scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server lightscope:eqversion:07-00

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 65scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 20scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.5.0 51scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 27scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jdk 1.5.0 38scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.7.0 11scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 4scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 19scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/fscope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 23scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 22scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 06scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 25scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.7.0 9scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 33scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus developerscope:eqversion:0107-00

Trust: 0.9

vendor:sunmodel:jre 22scope:eqversion:1.5

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00

Trust: 0.9

vendor:hitachimodel:ucosminexus clientscope:eqversion:06-71

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-00

Trust: 0.6

vendor:hitachimodel:ucosminexus client )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-05-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-50-/cscope: - version: -

Trust: 0.6

vendor:oraclemodel:jdk 1.7.0 17scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus clientscope:eqversion:06-02

Trust: 0.6

vendor:sunmodel:jdk 01-b06scope:eqversion:1.6

Trust: 0.6

vendor:hitachimodel:cosminexus primary server basescope:eqversion:06-51

Trust: 0.6

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus developerscope:eqversion:05-00

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus developer professional for plug-in )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus studio 05-05-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus primary server base )scope:eqversion:06-50

Trust: 0.6

vendor:oraclemodel:jrescope:eqversion:1.8

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-00

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-50-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus studioscope:eqversion:05-00

Trust: 0.6

vendor:oraclemodel:jre 1.7.0 21scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus client )scope:eqversion:06-50

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:cosminexus developer 05-05-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus operator )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus client 06-00-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-50-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-51

Trust: 0.6

vendor:oraclemodel:jdk 1.5.0 41scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-02

Trust: 0.6

vendor:hitachimodel:cosminexus primary server base 06-00-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard-r )scope:eqversion:08-50

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:oraclemodel:jre 1.7.0 12scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:06-71

Trust: 0.6

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-02

Trust: 0.6

vendor:hitachimodel:ucosminexus application server express )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus developer professional 06-00-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus developer professional 06-50-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus primary server base )scope:eqversion:06-00

Trust: 0.6

vendor:hitachimodel:cosminexus clientscope:eqversion:06-51

Trust: 0.6

vendor:hitachimodel:ucosminexus developer )scope:eqversion:0108-50

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-50-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-02

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 1.5.0 12scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-00-/iscope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.6.0 2scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus developer professional 06-50-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-51

Trust: 0.6

vendor:hitachimodel:cosminexus primary server base 06-50-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus developer light )scope:eqversion:08-50

Trust: 0.6

vendor:sunmodel:jdk 07-b03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:06-71

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus primary server base 06-50-/fscope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus client for plug-in )scope:eqversion:08-50

Trust: 0.6

vendor:oraclemodel:jre 1.5.0 45scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 12scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus client )scope:eqversion:06-00

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-51

Trust: 0.6

vendor:oraclemodel:jdkscope:eqversion:1.8

Trust: 0.6

vendor:hitachimodel:ucosminexus application server light )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus primary server basescope:eqversion:06-02

Trust: 0.6

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-00

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus developer professional )scope:eqversion:06-50

Trust: 0.6

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:06-71

Trust: 0.6

vendor:hitachimodel:cosminexus client 06-50-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform messaging )scope:eqversion:-08-50

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-00-/iscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 11scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 11-b03scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:cosminexus developer professional )scope:eqversion:06-00

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-50

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-50

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:08-50

Trust: 0.6

vendor:hitachimodel:cosminexus client 06-50-/cscope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 07scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.6.0 01scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.6.0 20scope: - version: -

Trust: 0.6

vendor:junipermodel:junos spacescope:eqversion:15.1

Trust: 0.6

vendor:hitachimodel:ucosminexus application server light (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:ibmmodel:websphere transformation extenderscope:eqversion:8.30

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:0107-10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:07-00

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5.0.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server light )scope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:07-00

Trust: 0.3

vendor:junipermodel:junos space ja1500 appliancescope:eqversion: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.5

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-02

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.47

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/bscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:12.10

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-50

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.1.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-51

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.43

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-02-/gscope: - version: -

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:06-72

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-02-/dscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.2.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.1

Trust: 0.3

vendor:oraclemodel:jrockit r28.3.1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developer (solaris(sparcscope:eqversion:0108-00

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.35

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.39

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.31

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-in )scope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/mscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.14

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus operator (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-in (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-10

Trust: 0.3

vendor:oraclemodel:jrockit r28.0.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:runtimes for java technology 7r1 sr1scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:8.6

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:08-50

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.4

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.2

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.0.11

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.5

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:multi-enterprise integration gatewayscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.2

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:07-00

Trust: 0.3

vendor:oraclemodel:jrockit r28.1.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.0

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-51-/escope: - version: -

Trust: 0.3

vendor:ibmmodel:ts7740 virtualization enginescope:eqversion:3957-v06

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.2.110

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:0

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:08-20

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-51

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:3.2

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-02-/dscope: - version: -

Trust: 0.3

vendor:ibmmodel:quickfilescope:eqversion:1.1.0.1

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:05-02

Trust: 0.3

vendor:redhatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/mscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5.0.1

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11-b03scope: - version: -

Trust: 0.3

vendor:ibmmodel:web sphere real time service refreshscope:eqversion:36

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-02-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer )scope:eqversion:0108-20

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-50-/iscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:11

Trust: 0.3

vendor:junipermodel:network and security manager software r4scope:eqversion:2012.2

Trust: 0.3

vendor:ibmmodel:enterprise content management system monitorscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:8.5

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-02-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-inscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.16

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.12

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server expressscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/pscope: - version: -

Trust: 0.3

vendor:ibmmodel:content collectorscope:eqversion:2.1.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base )scope:eqversion:06-02

Trust: 0.3

vendor:susemodel:linux enterprise server sp4 ltssscope:eqversion:10

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.2.1

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.4

Trust: 0.3

vendor:ibmmodel:websphere transformation extenderscope:eqversion:8.2

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/pscope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server light )scope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-rscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-51-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/escope: - version: -

Trust: 0.3

vendor:sunmodel:jre 1.5.0 08scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-02-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/rscope: - version: -

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5.2.1

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-60

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus application server expressscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/a (windows(ipscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.37

Trust: 0.3

vendor:ibmmodel:cognos expressscope:eqversion:10.2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-r )scope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for softwarescope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server smart edition )scope:eqversion:08-20

Trust: 0.3

vendor:junipermodel:network and security manager software r6scope:eqversion:2012.2

Trust: 0.3

vendor:oraclemodel:jrockit r27.8.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos expressscope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere ilog jrulesscope:eqversion:7.0.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-inscope:eqversion:09-00

Trust: 0.3

vendor:avayamodel:cms r17ac.gscope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-51-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-51

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server express )scope:eqversion:09-00

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.1.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.5

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.24

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:ucosminexus client (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:tivoli provisioning managerscope:eqversion:7.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-00-/bscope: - version: -

Trust: 0.3

vendor:avayamodel:cms r17ac.hscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.1

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-inscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-00-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.0

Trust: 0.3

vendor:hitachimodel:ucosminexus operator )scope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.3

Trust: 0.3

vendor:junipermodel:network and security manager software r3scope:eqversion:2012.2

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-02

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-05-/oscope: - version: -

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.10

Trust: 0.3

vendor:junipermodel:nsm3000scope:eqversion: -

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.2.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0-50scope:eqversion:1.5.015

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-02-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-50

Trust: 0.3

vendor:sunmodel:jdk 01scope:eqversion:1.6

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-01-/lscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.13

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-in )scope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:6.1

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.5scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-02-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:filenet system monitorscope:eqversion:4.5

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp3scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:08-20

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:8.0

Trust: 0.3

vendor:junipermodel:network and security manager softwarescope:eqversion:2012.2-

Trust: 0.3

vendor:junipermodel:junos space ja2500 appliancescope:eqversion: -

Trust: 0.3

vendor:redhatmodel:enterprise linux server eus 6.5.zscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server sp2 ltssscope:eqversion:11

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/qscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messagingscope:eqversion:-07-10

Trust: 0.3

vendor:ibmmodel:websphere sensor eventsscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-in (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messaging )scope:eqversion:-09-50

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:12.10

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:ibmmodel:quickfilescope:eqversion:1.0.0.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-r (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-10

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.4

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-50-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server lightscope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.14

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/qscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 for vmwarescope:eqversion:11

Trust: 0.3

vendor:hitachimodel:ucosminexus application server lightscope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.1.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/escope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.15

Trust: 0.3

vendor:hitachimodel:cosminexus client )scope:eqversion:06-02

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.2

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.4

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:smartcloud provisioningscope:eqversion:1.2

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.11

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:06-71

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:ibmmodel:runtimes for java technologyscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.5

Trust: 0.3

vendor:avayamodel:ip office server editionscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-in )scope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.3

Trust: 0.3

vendor:hitachimodel:ucosminexus operator )scope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:08-20

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2.1.6

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-50-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-in )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-00-/bscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:runtimes for java technologyscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:13.3

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.19

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light )scope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.25

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-rscope:eqversion:07-10

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.0

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/qscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 07scope:eqversion:1.5

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base )scope:eqversion:06-51

Trust: 0.3

vendor:ibmmodel:runtimes for java technology sr8scope:eqversion:6.0.1

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:0109-00

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-50

Trust: 0.3

vendor:avayamodel:one-x client enablement servicesscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server smart edition )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-01

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2.2.1

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.2.2

Trust: 0.3

vendor:ibmmodel:tivoli system automation for integrated operations managementscope:eqversion:2.1.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/a (windows(ipscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli directory serverscope:eqversion:6.3

Trust: 0.3

vendor:oraclemodel:jrockit r28.0.1scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messaging )scope:eqversion:-09-00

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1.1

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-02-/gscope: - version: -

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:tivoli system automation for integrated operations managementscope:eqversion:2.1.2

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-in )scope:eqversion:07-00

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-50-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/qscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:06-71

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.7scope: - version: -

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.0.1

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2.0

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.23

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:rational insight ifix1scope:eqversion:1.0.1

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-51-/nscope: - version: -

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:13.10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer (solaris(sparcscope:eqversion:0107-00

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-71-/mscope: - version: -

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2143

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-51

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:web sphere real time service refreshscope:neversion:37

Trust: 0.3

vendor:avayamodel:aura conferencing sp1 standardscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-00

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server express )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.6

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-inscope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.1

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:junipermodel:junos space r1.8scope:eqversion:13.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.4

Trust: 0.3

vendor:avayamodel:aura system manager sp3scope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server express (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-50-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:runtimes for java technologyscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.2.2

Trust: 0.3

vendor:hitachimodel:ucosminexus client )scope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.3.0

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node supplementaryscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-70-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/oscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.13

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server light )scope:eqversion:08-20

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional )scope:eqversion:06-51

Trust: 0.3

vendor:hitachimodel:ucosminexus developer )scope:eqversion:0107-00

Trust: 0.3

vendor:sunmodel:jdk 0 03scope:eqversion:1.5

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-in (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:susemodel:managerscope:eqversion:111.7

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:8.1

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.29

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-60

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.37

Trust: 0.3

vendor:oraclemodel:java se embedded 7u45scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:lotus quickr for websphere portalscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:1.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/sscope: - version: -

Trust: 0.3

vendor:ibmmodel:content collectorscope:eqversion:4.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-r )scope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-02-/fscope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2.1

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.3

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-inscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:1.0.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-72-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus client )scope:eqversion:06-51

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.1.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5.0.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/pscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-71-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:smartcloud provisioningscope:eqversion:2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:eqversion:7.1.3.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server light )scope:eqversion:07-00

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:ucosminexus operator (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server light (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-50-/escope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.1.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.4

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messaging )scope:eqversion:-07-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.27

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:tivoli provisioning managerscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:websphere sensor eventsscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli system automation for integrated operations managementscope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:junipermodel:junos space 14.1r1scope:neversion: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-05-/rscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.3

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-71-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server light )scope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:06-70

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.7

Trust: 0.3

vendor:junipermodel:nsmexpressscope:eqversion: -

Trust: 0.3

vendor:oraclemodel:jrockit r27.1.0scope: - version: -

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.31

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-02-/escope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.13

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:jrockit r28.1.4scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-02-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:neversion:7.1.32

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.31

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:09-00

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.1.185

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.6scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-50-/bscope: - version: -

Trust: 0.3

vendor:junipermodel:network and security manager software r7scope:eqversion:2012.2

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus client )scope:eqversion:08-20

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.8scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1.2

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-50-/escope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere ilog jrulesscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.33

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.45

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-70-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/nscope: - version: -

Trust: 0.3

vendor:ibmmodel:runtimes for java technology 7.sr7scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.01

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-in (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional )scope:eqversion:06-02

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/gscope: - version: -

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.4scope: - version: -

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer )scope:eqversion:0107-10

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-50-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/lscope: - version: -

Trust: 0.3

vendor:avayamodel:ip office server editionscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus client )scope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.22

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:5.5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.1

Trust: 0.3

vendor:ibmmodel:ts7740 virtualization enginescope:eqversion:3957-v07

Trust: 0.3

vendor:oraclemodel:jrockit r27.7.6scope: - version: -

Trust: 0.3

vendor:junipermodel:network and security manager software r5scope:eqversion:2012.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:06-72

Trust: 0.3

vendor:junipermodel:network and security manager software r8scope:eqversion:2012.2

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.11

Trust: 0.3

vendor:ibmmodel:tivoli directory serverscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-in )scope:eqversion:08-20

Trust: 0.3

vendor:ibmmodel:content collectorscope:eqversion:2.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:06-70

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.6

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.2.3

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/nscope: - version: -

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:9.0.1.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:06-72

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:hitachimodel:ucosminexus client )scope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:05-01

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.1.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.1

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:08-20

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/escope: - version: -

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:05-01

Trust: 0.3

vendor:hitachimodel:ucosminexus application server express )scope:eqversion:08-20

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:09-50

Trust: 0.3

vendor:sunmodel:jdk 0 09scope:eqversion:1.5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.5

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:3.2.1

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.3

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-51-/bscope: - version: -

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.29

Trust: 0.3

vendor:ibmmodel:smartcloud provisioningscope:eqversion:2.3

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:cognos expressscope:eqversion:9.5

Trust: 0.3

vendor:hitachimodel:ucosminexus client (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-in )scope:eqversion:09-50

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53003.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0.1

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.1

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:websphere transformation extenderscope:eqversion:8.4.10

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:0109-50

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-r )scope:eqversion:08-20

Trust: 0.3

vendor:sunmodel:jdk 1.6.0 01-b06scope: - version: -

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.1

Trust: 0.3

vendor:oraclemodel:jrockit r28.2.9scope: - version: -

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/gscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.27

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:6.1.5

Trust: 0.3

vendor:oraclemodel:java se embedded 7u51scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server express )scope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-02-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli provisioning managerscope:eqversion:7.2

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.17

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-60

Trust: 0.3

vendor:huaweimodel:espace ivs v100r001scope: - version: -

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:1.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-r (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.1.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus operator )scope:eqversion:07-10

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus application server smart edition )scope:eqversion:08-50

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:oraclemodel:jrockit r28.2.8scope: - version: -

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.2scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-in )scope:eqversion:08-20

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light )scope:eqversion:08-20

Trust: 0.3

vendor:ibmmodel:content collectorscope:eqversion:3.0

Trust: 0.3

vendor:susemodel:linux enterprise java sp3scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.4

Trust: 0.3

vendor:ibmmodel:websphere operational decision managementscope:eqversion:7.5

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-r )scope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-in )scope:eqversion:07-00

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:13.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server smart edition (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:ibmmodel:tivoli directory serverscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-05-/oscope: - version: -

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.9scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-inscope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:neversion:7.3.11

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/pscope: - version: -

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.3scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-00-/sscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server smart editionscope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:maximo asset managementscope:eqversion:7.5

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:runtimes for java technology sr16-fp6scope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.23

Trust: 0.3

vendor:junipermodel:junos space 13.1p1.14scope: - version: -

Trust: 0.3

vendor:ibmmodel:smartcloud provisioning fp3 if0001scope:eqversion:2.1

Trust: 0.3

vendor:junipermodel:network and security manager software 2012.2r9scope:neversion: -

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-00

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:10

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.8

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-02

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-00-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messagingscope:eqversion:-09-50

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.7

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2.177

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:06-72

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.1.1

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messaging (solaris(sparcscope:eqversion:-07-00

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:1.0.21

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2.2

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.2.0

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:05-02

Trust: 0.3

vendor:hitachimodel:ucosminexus operator )scope:eqversion:07-00

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.6

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.141

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:08-20

Trust: 0.3

vendor:ibmmodel:infosphere streamsscope:eqversion:1.0.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-72-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/iscope: - version: -

Trust: 0.3

vendor:junipermodel:network and security manager software r2scope:eqversion:2012.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server express )scope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus developer )scope:eqversion:0109-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light )scope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-50-/escope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:4.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.1.2.13

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.13

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-rscope:eqversion:09-50

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-in )scope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0.0.4

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-02-/gscope: - version: -

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.10

Trust: 0.3

vendor:avayamodel:aura collaboration environmentscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:tivoli system automation application managerscope:eqversion:3.1

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messaging )scope:eqversion:-07-10

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.12

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.3

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-05-/rscope: - version: -

Trust: 0.3

vendor:oraclemodel:jrockit r28.1.3scope: - version: -

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/a (windows(ipscope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:ibmmodel:maximo asset managementscope:eqversion:7.1.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer )scope:eqversion:0109-50

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.1.1

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2.178

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server lightscope:eqversion:09-50

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.145

Trust: 0.3

vendor:oraclemodel:java se embedded 7u40scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-50-/bscope: - version: -

Trust: 0.3

vendor:avayamodel:aura presence services sp1scope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-51-/nscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-02

Trust: 0.3

vendor:ibmmodel:runtimes for java technology sr16scope:eqversion:6

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-00-/sscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/a (windows(ipscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere transformation extenderscope:eqversion:8.40

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server express (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messagingscope:eqversion:-09-00

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.9

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messaging (solaris(sparcscope:eqversion:-08-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.34

Trust: 0.3

vendor:ibmmodel:security directory serverscope:eqversion:6.3.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server expressscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/lscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus client )scope:eqversion:09-50

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp1 ltssscope:eqversion:11

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-72-/dscope: - version: -

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.8

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 07-b03scope: - version: -

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light (solaris(sparcscope:eqversion:08-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.18

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/bscope: - version: -

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messaging )scope:eqversion:-08-20

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.2.145

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-r )scope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-72-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:ts7720 virtualization engine 3957-veascope: - version: -

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect (solaris(sparcscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:9.0.1.0

Trust: 0.3

vendor:ibmmodel:system networking switch centerscope:neversion:7.2.111

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/nscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server smart edition )scope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:websphere business eventsscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:hitachimodel:cosminexus primary server base 06-02-/dscope: - version: -

Trust: 0.3

vendor:ibmmodel:smartcloud provisioning fixpackscope:eqversion:2.31

Trust: 0.3

vendor:hitachimodel:ucosminexus operator )scope:eqversion:08-20

Trust: 0.3

vendor:vmwaremodel:vcenter update managerscope:eqversion:5.5

Trust: 0.3

sources: BID: 66916 // CNNVD: CNNVD-201404-275 // NVD: CVE-2014-0460

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0460
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-201404-275
value: MEDIUM

Trust: 0.6

VULHUB: VHN-67953
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-0460
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-0460
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-67953
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-67953 // VULMON: CVE-2014-0460 // CNNVD: CNNVD-201404-275 // NVD: CVE-2014-0460

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2014-0460

THREAT TYPE

remote

Trust: 1.4

sources: PACKETSTORM: 126182 // PACKETSTORM: 127041 // PACKETSTORM: 126181 // PACKETSTORM: 127938 // PACKETSTORM: 126664 // PACKETSTORM: 127939 // PACKETSTORM: 127027 // PACKETSTORM: 126183 // CNNVD: CNNVD-201404-275

TYPE

arbitrary

Trust: 0.7

sources: PACKETSTORM: 126182 // PACKETSTORM: 130400 // PACKETSTORM: 127041 // PACKETSTORM: 126181 // PACKETSTORM: 126664 // PACKETSTORM: 127027 // PACKETSTORM: 126183

PATCH

title:jdk-7u55-nb-8-windows-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49309

Trust: 0.6

title:jre-7u55-macosx-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49313

Trust: 0.6

title:jdk-8u5-linux-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49317

Trust: 0.6

title:jre-7u55-windows-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49312

Trust: 0.6

title:jdk-8u5-macosx-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49316

Trust: 0.6

title:jre-8u5-linux-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49320

Trust: 0.6

title:jdk-7u55-nb-8-linux-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49311

Trust: 0.6

title:jdk-8u5-windows-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49315

Trust: 0.6

title:jre-8u5-macosx-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49319

Trust: 0.6

title:jdk-7u55-nb-8-macosx-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49310

Trust: 0.6

title:jre-7u55-linux-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49314

Trust: 0.6

title:jre-8u5-windows-x64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49318

Trust: 0.6

title:Red Hat: CVE-2014-0460url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0460

Trust: 0.1

title:Ubuntu Security Notice: openjdk-7 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2187-1

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2191-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-326url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-326

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-327url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-327

Trust: 0.1

sources: VULMON: CVE-2014-0460 // CNNVD: CNNVD-201404-275

EXTERNAL IDS

db:NVDid:CVE-2014-0460

Trust: 3.5

db:BIDid:66916

Trust: 2.1

db:SECUNIAid:58415

Trust: 1.8

db:SECUNIAid:59307

Trust: 1.8

db:SECUNIAid:60117

Trust: 1.8

db:SECUNIAid:59082

Trust: 1.8

db:SECUNIAid:59255

Trust: 1.8

db:SECUNIAid:59706

Trust: 1.8

db:SECUNIAid:59071

Trust: 1.8

db:SECUNIAid:59642

Trust: 1.8

db:SECUNIAid:59250

Trust: 1.8

db:SECUNIAid:61264

Trust: 1.8

db:SECUNIAid:59023

Trust: 1.8

db:SECUNIAid:59704

Trust: 1.8

db:SECUNIAid:59058

Trust: 1.8

db:SECUNIAid:59022

Trust: 1.8

db:SECUNIAid:59516

Trust: 1.8

db:SECUNIAid:60003

Trust: 1.8

db:SECUNIAid:59436

Trust: 1.8

db:SECUNIAid:59705

Trust: 1.8

db:SECUNIAid:60111

Trust: 1.8

db:JUNIPERid:JSA10698

Trust: 1.8

db:CNNVDid:CNNVD-201404-275

Trust: 0.7

db:JUNIPERid:JSA10659

Trust: 0.3

db:JUNIPERid:JSA10642

Trust: 0.3

db:HITACHIid:HS14-009

Trust: 0.3

db:VULHUBid:VHN-67953

Trust: 0.1

db:VULMONid:CVE-2014-0460

Trust: 0.1

db:PACKETSTORMid:126200

Trust: 0.1

db:PACKETSTORMid:126182

Trust: 0.1

db:PACKETSTORMid:130400

Trust: 0.1

db:PACKETSTORMid:127655

Trust: 0.1

db:PACKETSTORMid:126443

Trust: 0.1

db:PACKETSTORMid:127041

Trust: 0.1

db:PACKETSTORMid:126195

Trust: 0.1

db:PACKETSTORMid:126181

Trust: 0.1

db:PACKETSTORMid:127938

Trust: 0.1

db:PACKETSTORMid:126664

Trust: 0.1

db:PACKETSTORMid:127939

Trust: 0.1

db:PACKETSTORMid:127027

Trust: 0.1

db:PACKETSTORMid:126183

Trust: 0.1

db:PACKETSTORMid:126631

Trust: 0.1

sources: VULHUB: VHN-67953 // VULMON: CVE-2014-0460 // BID: 66916 // PACKETSTORM: 126200 // PACKETSTORM: 126182 // PACKETSTORM: 130400 // PACKETSTORM: 127655 // PACKETSTORM: 126443 // PACKETSTORM: 127041 // PACKETSTORM: 126195 // PACKETSTORM: 126181 // PACKETSTORM: 127938 // PACKETSTORM: 126664 // PACKETSTORM: 127939 // PACKETSTORM: 127027 // PACKETSTORM: 126183 // PACKETSTORM: 126631 // CNNVD: CNNVD-201404-275 // NVD: CVE-2014-0460

REFERENCES

url:http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html

Trust: 2.4

url:http://rhn.redhat.com/errata/rhsa-2014-0675.html

Trust: 2.2

url:http://rhn.redhat.com/errata/rhsa-2014-0685.html

Trust: 2.2

url:http://www-01.ibm.com/support/docview.wss?uid=swg21672080

Trust: 2.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674539

Trust: 2.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676315

Trust: 2.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677294

Trust: 2.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21681256

Trust: 2.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21683484

Trust: 2.1

url:http://www.securityfocus.com/bid/66916

Trust: 1.9

url:http://security.gentoo.org/glsa/glsa-201502-12.xml

Trust: 1.9

url:http://www.ubuntu.com/usn/usn-2191-1

Trust: 1.9

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673836

Trust: 1.8

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676672

Trust: 1.8

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676746

Trust: 1.8

url:http://www-01.ibm.com/support/docview.wss?uid=swg21679713

Trust: 1.8

url:http://www-01.ibm.com/support/docview.wss?uid=swg21681018

Trust: 1.8

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686717

Trust: 1.8

url:http://www.ibm.com/support/docview.wss?uid=swg21675343

Trust: 1.8

url:http://www.ibm.com/support/docview.wss?uid=swg21675588

Trust: 1.8

url:http://www.ibm.com/support/docview.wss?uid=swg21677387

Trust: 1.8

url:http://www.debian.org/security/2014/dsa-2912

Trust: 1.8

url:http://security.gentoo.org/glsa/glsa-201406-32.xml

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2014:0413

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2014:0414

Trust: 1.8

url:http://secunia.com/advisories/58415

Trust: 1.8

url:http://secunia.com/advisories/59022

Trust: 1.8

url:http://secunia.com/advisories/59023

Trust: 1.8

url:http://secunia.com/advisories/59058

Trust: 1.8

url:http://secunia.com/advisories/59071

Trust: 1.8

url:http://secunia.com/advisories/59082

Trust: 1.8

url:http://secunia.com/advisories/59250

Trust: 1.8

url:http://secunia.com/advisories/59255

Trust: 1.8

url:http://secunia.com/advisories/59307

Trust: 1.8

url:http://secunia.com/advisories/59436

Trust: 1.8

url:http://secunia.com/advisories/59516

Trust: 1.8

url:http://secunia.com/advisories/59642

Trust: 1.8

url:http://secunia.com/advisories/59704

Trust: 1.8

url:http://secunia.com/advisories/59705

Trust: 1.8

url:http://secunia.com/advisories/59706

Trust: 1.8

url:http://secunia.com/advisories/60003

Trust: 1.8

url:http://secunia.com/advisories/60111

Trust: 1.8

url:http://secunia.com/advisories/60117

Trust: 1.8

url:http://secunia.com/advisories/61264

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-2187-1

Trust: 1.8

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10698

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=140852974709252&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=140852886808946&w=2

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-0446

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0429

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-2412

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0451

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-2414

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-2398

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0458

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0452

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0460

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0461

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0453

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1876

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0456

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0457

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2403

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2397

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2014-2421

Trust: 1.0

url:https://www.redhat.com/security/data/cve/cve-2014-0451.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0453.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-2421.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0452.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-2423.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0461.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-2427.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0446.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-2414.html

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0458.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-1876.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0460.html

Trust: 0.9

url:https://access.redhat.com/security/team/key/#package

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-2412.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-2398.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0457.html

Trust: 0.9

url:https://www.redhat.com/security/data/cve/cve-2014-0429.html

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2014-2427

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2014-2423

Trust: 0.9

url:https://access.redhat.com/site/articles/11258

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0459

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-2413

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-0455

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-0454

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-2402

Trust: 0.7

url:https://www.redhat.com/security/data/cve/cve-2014-0456.html

Trust: 0.7

url:https://www.redhat.com/security/data/cve/cve-2014-2403.html

Trust: 0.7

url:https://www.redhat.com/security/data/cve/cve-2014-2397.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-0449

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2013-6629

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2013-6954

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-2409

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-2401

Trust: 0.5

url:https://www.redhat.com/security/data/cve/cve-2014-2420.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2409.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0449.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2013-6629.html

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2013-6954.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0459.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0454.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2428.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2401.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2413.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0455.html

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-2402.html

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10642&cat=sirt_1&actp=list

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10659&cat=sirt_1&actp=list

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21682740

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687642

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687297

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-009/index.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685689

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/java_apr2014_advisory.asc

Trust: 0.3

url:http://www.oracle.com/technetwork/java/index.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680565

Trust: 0.3

url:https://www.suse.com/support/update/announcement/2014/suse-su-20140639-1.html

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21685350

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2014-0008.html

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100180008

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21686718

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10659

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21678048

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04398943

Trust: 0.3

url: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04398922

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675343

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21681114

Trust: 0.3

url:http://www.ibm.com/developerworks/java/jdk/alerts/#oracle_april_15_2014_cpu

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004969

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv59507

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv59550

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv59555

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676860

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100180257

Trust: 0.3

url:asa-2014-203

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21686717

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21677072

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21683527

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21678218

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21679524

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21678544

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1020989

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675588

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673013

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21672047

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=nas8n1020184

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21679187

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677387

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673576

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678883

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21664899

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21675205

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-0432

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-0448

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-2420

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0406.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5896.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0428.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5910.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5899.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0416.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0403.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0422.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0368.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0415.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5889.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0375.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0423.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5878.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0376.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0410.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5907.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0373.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0411.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0417.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0424.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5898.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5884.html

Trust: 0.2

url:https://www.ibm.com/developerworks/java/jdk/alerts/

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5887.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0387.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-5888.html

Trust: 0.2

url:http://www.hp.com/java

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://www.hp.com/go/swa

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-2428

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10698

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=140852886808946&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=140852974709252&amp;w=2

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-0460

Trust: 0.1

url:https://usn.ubuntu.com/2187-1/

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0432.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0413.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0448.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-2422.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6562

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0455

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2412

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0454

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2414

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6531

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6493

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6532

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2401

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2409

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4266

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4219

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4209

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4263

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2421

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6468

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4247

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6511

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4265

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6513

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6504

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2402

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2420

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0464

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4221

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6527

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4216

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2403

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2398

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2422

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4227

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4252

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4244

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4262

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0461

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2427

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2490

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0429

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4208

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2410

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6512

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4264

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6466

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6517

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4288

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0448

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6519

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2483

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6485

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0432

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4223

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2397

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0446

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2428

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6476

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0449

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6502

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4268

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4218

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4220

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2410

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6506

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0464

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2413

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6503

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6515

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5887

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0878.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5910

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0982.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0417

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5878

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0376

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0428

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0415

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0411

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0422

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0423

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0410

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0424

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0416

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0373

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5899

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0403

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0375

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0387

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b31-1.13.3-1ubuntu1~0.10.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0462

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2405

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b31-1.13.3-1ubuntu1~0.12.04.2

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2468.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2456

Trust: 0.1

url:http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2455

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2463.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2446.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-1500.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5817.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5797.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2444.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2445.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2454.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1571

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0414.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5782.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2468

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2448

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5802.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2466

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5803.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5832.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2465

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5778.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2446

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2451

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2451.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5823.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2450

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5783.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5801.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2442

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2453

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5780.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2445

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5818.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2456.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5824.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5789.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-3743.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1500

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2407.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2470.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5850.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5812.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5842.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5902.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5849.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2437

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2471.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5831.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2443.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2457.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5776.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2412.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2407

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2447

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5848.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2443

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2461.html

Trust: 0.1

url:http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2452

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2447.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2452.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5852.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5840.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2464.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-1571.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-3829.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2463

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2465.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2472.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5772.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2466.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2453.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2473.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2454

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2437.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2444

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5905.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5819.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2450.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5820.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5809.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2457

Trust: 0.1

url:http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2455.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2459.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2442.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5825.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5774.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5830.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2461

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5784.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2448.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-4002.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0418.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5906.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5790.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5787.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2469.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5804.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5843.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5814.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2412

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-5829.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0407.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2403

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0461

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0452

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0455

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1876

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0456

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2397

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2421

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://blog.fuseyism.com/index.php/2014/04/16/security-icedtea-2-4-7-for-openjdk-7-released/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2413

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0453

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2402

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2412

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2414

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0460

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0429

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0454

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2423

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2427

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0458

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0451

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0189.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0446

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0459

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0457

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2398

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4216

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4209

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0408.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0508.html

Trust: 0.1

sources: VULHUB: VHN-67953 // VULMON: CVE-2014-0460 // BID: 66916 // PACKETSTORM: 126200 // PACKETSTORM: 126182 // PACKETSTORM: 130400 // PACKETSTORM: 127655 // PACKETSTORM: 126443 // PACKETSTORM: 127041 // PACKETSTORM: 126195 // PACKETSTORM: 126181 // PACKETSTORM: 127938 // PACKETSTORM: 126664 // PACKETSTORM: 127939 // PACKETSTORM: 127027 // PACKETSTORM: 126183 // PACKETSTORM: 126631 // CNNVD: CNNVD-201404-275 // NVD: CVE-2014-0460

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 126200 // PACKETSTORM: 126182 // PACKETSTORM: 127655 // PACKETSTORM: 127041 // PACKETSTORM: 126195 // PACKETSTORM: 126181 // PACKETSTORM: 127027 // PACKETSTORM: 126183 // PACKETSTORM: 126631

SOURCES

db:VULHUBid:VHN-67953
db:VULMONid:CVE-2014-0460
db:BIDid:66916
db:PACKETSTORMid:126200
db:PACKETSTORMid:126182
db:PACKETSTORMid:130400
db:PACKETSTORMid:127655
db:PACKETSTORMid:126443
db:PACKETSTORMid:127041
db:PACKETSTORMid:126195
db:PACKETSTORMid:126181
db:PACKETSTORMid:127938
db:PACKETSTORMid:126664
db:PACKETSTORMid:127939
db:PACKETSTORMid:127027
db:PACKETSTORMid:126183
db:PACKETSTORMid:126631
db:CNNVDid:CNNVD-201404-275
db:NVDid:CVE-2014-0460

LAST UPDATE DATE

2025-03-02T20:19:34.071000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-67953date:2022-05-09T00:00:00
db:VULMONid:CVE-2014-0460date:2020-09-08T00:00:00
db:BIDid:66916date:2015-05-07T17:18:00
db:CNNVDid:CNNVD-201404-275date:2020-10-23T00:00:00
db:NVDid:CVE-2014-0460date:2024-11-21T02:02:10.850

SOURCES RELEASE DATE

db:VULHUBid:VHN-67953date:2014-04-16T00:00:00
db:VULMONid:CVE-2014-0460date:2014-04-16T00:00:00
db:BIDid:66916date:2014-04-15T00:00:00
db:PACKETSTORMid:126200date:2014-04-17T22:02:41
db:PACKETSTORMid:126182date:2014-04-16T20:42:08
db:PACKETSTORMid:130400date:2015-02-16T17:24:02
db:PACKETSTORMid:127655date:2014-07-29T22:17:21
db:PACKETSTORMid:126443date:2014-05-02T06:40:40
db:PACKETSTORMid:127041date:2014-06-11T00:10:43
db:PACKETSTORMid:126195date:2014-04-17T22:01:36
db:PACKETSTORMid:126181date:2014-04-16T20:41:55
db:PACKETSTORMid:127938date:2014-08-20T15:19:26
db:PACKETSTORMid:126664date:2014-05-19T03:11:59
db:PACKETSTORMid:127939date:2014-08-20T15:19:50
db:PACKETSTORMid:127027date:2014-06-11T00:06:58
db:PACKETSTORMid:126183date:2014-04-16T20:42:18
db:PACKETSTORMid:126631date:2014-05-15T21:38:43
db:CNNVDid:CNNVD-201404-275date:2014-04-18T00:00:00
db:NVDid:CVE-2014-0460date:2014-04-16T01:55:09.993