ID

VAR-201404-0585


CVE

CVE-2014-0050


TITLE

Apache Commons FileUpload CVE-2014-0050 Denial Of Service Vulnerability

Trust: 0.3

sources: BID: 65400

DESCRIPTION

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. Apache Commons FileUpload is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause the application to enter an infinite loop which may cause denial-of-service conditions. The following products are vulnerable: Apache Commons FileUpload 1.0 through versions 1.3 Apache Tomcat 8.0.0-RC1 through versions 8.0.1 Apache Tomcat 7.0.0 through versions 7.0.50. JBoss Web Server provides organizations with a single deployment platform for Java Server Pages (JSP) and Java Servlet technologies, PHP, and CGI. It uses a genuine high performance hybrid technology that incorporates the best of the most recent OS technologies for processing high volume data, while keeping all the reference Java specifications. Apache Commons FileUpload package makes it easy to add robust, high-performance, file upload capability to servlets and web applications. Apache Tomcat 7.x before 7.0.50 allows attackers to obtain Tomcat internals information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (CVE-2013-4590). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227 http://advisories.mageia.org/MGASA-2014-0110.html http://advisories.mageia.org/MGASA-2014-0149.html http://advisories.mageia.org/MGASA-2014-0268.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 2/X86_64: 58f55f0050c7ac4eb3c31308cc62d244 mbs2/x86_64/tomcat-7.0.59-1.mbs2.noarch.rpm 9c28750a8ec902d5bde42748a14d99ab mbs2/x86_64/tomcat-admin-webapps-7.0.59-1.mbs2.noarch.rpm b62639d405462dc9f28fd4afe11ddd57 mbs2/x86_64/tomcat-docs-webapp-7.0.59-1.mbs2.noarch.rpm 57b85f852426d5c7e282542165d2ea6f mbs2/x86_64/tomcat-el-2.2-api-7.0.59-1.mbs2.noarch.rpm 8410dbab11abe4f307576ecd657e427c mbs2/x86_64/tomcat-javadoc-7.0.59-1.mbs2.noarch.rpm aaffb8c0cd7d82c6dcb1b0ecc00dc7c8 mbs2/x86_64/tomcat-jsp-2.2-api-7.0.59-1.mbs2.noarch.rpm 538438ca90caa2eb6f49bca3bb6e0e2e mbs2/x86_64/tomcat-jsvc-7.0.59-1.mbs2.noarch.rpm 9a2d902c3a3e24af3f2da240c42c787f mbs2/x86_64/tomcat-lib-7.0.59-1.mbs2.noarch.rpm af5562b305ae7fd1406a9c94c9316cb5 mbs2/x86_64/tomcat-log4j-7.0.59-1.mbs2.noarch.rpm 3349a91a1667f299641e16aed4c3aadc mbs2/x86_64/tomcat-servlet-3.0-api-7.0.59-1.mbs2.noarch.rpm 4777adcbc177da7e1b8b158d6186141c mbs2/x86_64/tomcat-webapps-7.0.59-1.mbs2.noarch.rpm b832a8fcd47ae9fb696ca9424bd2a934 mbs2/SRPMS/tomcat-7.0.59-1.mbs2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04657823 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04657823 Version: 1 HPSBGN03329 rev.1 - HP SDN VAN Controller, Remote Denial of Service (DoS), Distributed Denial of Service (DDoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-05-11 Last Updated: 2015-05-11 Potential Security Impact: Remote Denial of Service (DoS), Distributed Denial of Service (DDoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP SDN VAN Controller. The vulnerabilities could be remotely exploited resulting in Denial of Service (DoS) or a Distributed Denial of Service (DDoS). References: CVE-2014-0050 Remote Denial of Service (DoS) CVE-2015-2122 Remote Distributed Denial of Service (DDoS) SSRT102049 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP SDN VAN Controller version 2.5 and earlier. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-0050 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-2122 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP recommends either of the two following workarounds for the vulnerabilities in the HP SDN VAN Controller. - The network for the server running the HP SDN VAN Controller management VLAN should be on a separate and isolated "management" VLAN. - Configure the firewall on the server running HP SDN VAN Controller so that the only network traffic allowed to the REST port is from trusted servers on the network that need to use the REST layer. For example: the Microsoft Lync Server for Optimizer. For more detailed information, please refer to the "Securing REST layer Access on HP VAN SDN Controllers" article at the following location: http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=em r_na-c04676756 HISTORY Version:1 (rev.1) - 11 May 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Tomcat 7 and 8 are therefore affected by this issue. While Tomcat 6 uses Commons FileUpload as part of the Manager application, access to that functionality is limited to authenticated administrators. This issue was reported responsibly to the Apache Software Foundation via JPCERT but an error in addressing an e-mail led to the unintended early disclosure of this issue[1]. Mitigation: Users of affected versions should apply one of the following mitigations - - Upgrade to Apache Commons FileUpload 1.3.1 or later once released - - Upgrade to Apache Tomcat 8.0.2 or later once released - - Upgrade to Apache Tomcat 7.0.51 or later once released - - Apply the appropriate patch - Commons FileUpload: http://svn.apache.org/r1565143 - Tomcat 8: http://svn.apache.org/r1565163 - Tomcat 7: http://svn.apache.org/r1565169 - - Limit the size of the Content-Type header to less than 4091 bytes Credit: This issue was reported to the Apache Software Foundation via JPCERT. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. It was found that when Tomcat processed a series of HTTP requests in which at least one request contained either multiple content-length headers, or one content-length header with a chunked transfer-encoding header, Tomcat would incorrectly handle the request. (CVE-2013-4286) It was discovered that the fix for CVE-2012-3544 did not properly resolve a denial of service flaw in the way Tomcat processed chunk extensions and trailing headers in chunked requests. A remote attacker could use this flaw to send an excessively long request that, when processed by Tomcat, could consume network bandwidth, CPU, and memory on the Tomcat server. Note that chunked transfer encoding is enabled by default. Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). Bugs fixed (https://bugzilla.redhat.com/): 1062337 - CVE-2014-0050 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream 1069905 - CVE-2013-4322 tomcat: incomplete fix for CVE-2012-3544 1069921 - CVE-2013-4286 tomcat: multiple content-length header poisoning flaws 5. By repeatedly sending a request for an authenticated resource while the victim is completing the login form, an attacker could inject a request that would be executed using the victim's credentials. CVE-2013-2071 A runtime exception in AsyncListener.onComplete() prevents the request from being recycled. This may expose elements of a previous request to a current request. CVE-2013-4322 When processing a request submitted using the chunked transfer encoding, Tomcat ignored but did not limit any extensions that were included. by streaming an unlimited amount of data to the server. For the stable distribution (wheezy), these problems have been fixed in version 7.0.28-4+deb7u1. For the testing distribution (jessie), these problems have been fixed in version 7.0.52-1. For the unstable distribution (sid), these problems have been fixed in version 7.0.52-1. We recommend that you upgrade your tomcat7 packages. Description: Fuse ESB Enterprise is an integration platform based on Apache ServiceMix. This release of Fuse ESB Enterprise/MQ Enterprise 7.1.0 R1 P3 is an update to Fuse ESB Enterprise 7.1.0 and Fuse MQ Enterprise 7.1.0. It includes various bug fixes, which are listed in the README file included with the patch files. The following security issues are also addressed with this release: It was found that XStream could deserialize arbitrary user-supplied XML content, representing objects of any type. (CVE-2013-7285) It was found that the Apache Camel XSLT component allowed XSL stylesheets to call external Java methods. (CVE-2014-0003) It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks. (CVE-2013-6440) It was found that the Apache Camel XSLT component would resolve entities in XML messages when transforming them using an XSLT route. Details on the update and each vulnerability are in the KM articles below. **Note:** The resolution for each vulnerability listed is to upgrade to SiteScope 11.32IP2 or an even more recent version of SiteScope if available. The SiteScope update can be can found in the personal zone in "my updates" in HPE Software Support Online: <https://softwaresupport.hpe.com>. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss A-MQ 6.1.0 update Advisory ID: RHSA-2014:0401-02 Product: Red Hat JBoss A-MQ Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0401.html Issue date: 2014-04-14 CVE Names: CVE-2013-2035 CVE-2013-2192 CVE-2013-4152 CVE-2013-6429 CVE-2013-6430 CVE-2014-0050 CVE-2014-0054 CVE-2014-0085 CVE-2014-1904 ===================================================================== 1. Summary: Red Hat JBoss A-MQ 6.1.0, which fixes multiple security issues, several bugs, and adds various enhancements, is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards-compliant messaging system that is tailored for use in mission critical applications. Red Hat JBoss A-MQ 6.1.0 is a minor product release that updates Red Hat JBoss A-MQ 6.0.0 and includes several bug fixes and enhancements. Refer to the Release Notes document, available from the link in the References section, for a list of changes. The following security issues are resolved with this update: A flaw was found in the Apache Hadoop RPC protocol. A man-in-the-middle attacker could possibly use this flaw to unilaterally disable bidirectional authentication between a client and a server, forcing a downgrade to simple (unidirectional) authentication. This flaw only affected users who have enabled Hadoop's Kerberos security features. (CVE-2013-2192) It was discovered that the Spring OXM wrapper did not expose any property for disabling entity resolution when using the JAXB unmarshaller. A remote attacker could use this flaw to conduct XML External Entity (XXE) attacks on web sites, and read files in the context of the user running the application server. The patch for this flaw disables external entity processing by default, and provides a configuration directive to re-enable it. (CVE-2013-4152) It was found that the Spring MVC SourceHttpMessageConverter enabled entity resolution by default. A remote attacker could use this flaw to conduct XXE attacks on web sites, and read files in the context of the user running the application server. The patch for this flaw disables external entity processing by default, and introduces a property to re-enable it. (CVE-2013-6429) The Spring JavaScript escape method insufficiently escaped some characters. Applications using this method to escape user-supplied content, which would be rendered in HTML5 documents, could be exposed to cross-site scripting (XSS) flaws. (CVE-2013-6430) A denial of service flaw was found in the way Apache Commons FileUpload handled small-sized buffers used by MultipartStream. (CVE-2014-0050) It was found that fixes for the CVE-2013-4152 and CVE-2013-6429 XXE issues in Spring were incomplete. Spring MVC processed user-provided XML and neither disabled XML external entities nor provided an option to disable them, possibly allowing a remote attacker to conduct XXE attacks. (CVE-2014-0054) A cross-site scripting (XSS) flaw was found in the Spring Framework when using Spring MVC. When the action was not specified in a Spring form, the action field would be populated with the requested URI, allowing an attacker to inject malicious content into the form. (CVE-2014-1904) The HawtJNI Library class wrote native libraries to a predictable file name in /tmp when the native libraries were bundled in a JAR file, and no custom library path was specified. A local attacker could overwrite these native libraries with malicious versions during the window between when HawtJNI writes them and when they are executed. (CVE-2013-2035) An information disclosure flaw was found in the way Apache Zookeeper stored the password of an administrative user in the log files. A local user with access to these log files could use the exposed sensitive information to gain administrative access to an application using Apache Zookeeper. (CVE-2014-0085) The CVE-2013-6430 issue was discovered by Jon Passki of Coverity SRL and Arun Neelicattu of the Red Hat Security Response Team, the CVE-2013-2035 issue was discovered by Florian Weimer of the Red Hat Product Security Team, and the CVE-2014-0085 issue was discovered by Graeme Colman of Red Hat. All users of Red Hat JBoss A-MQ 6.0.0 as provided from the Red Hat Customer Portal are advised to apply this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 958618 - CVE-2013-2035 HawtJNI: predictable temporary file name leading to local arbitrary code execution 1000186 - CVE-2013-4152 Spring Framework: XML External Entity (XXE) injection flaw 1001326 - CVE-2013-2192 hadoop: man-in-the-middle vulnerability 1039783 - CVE-2013-6430 Spring Framework: org.spring.web.util.JavaScriptUtils.javaScriptEscape insufficient escaping of characters 1053290 - CVE-2013-6429 Spring Framework: XML External Entity (XXE) injection flaw 1062337 - CVE-2014-0050 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream 1067265 - CVE-2014-0085 Apache Zookeeper: admin user cleartext password appears in logging 1075296 - CVE-2014-1904 Spring Framework: cross-site scripting flaw when using Spring MVC 1075328 - CVE-2014-0054 Spring Framework: incomplete fix for CVE-2013-4152/CVE-2013-6429 5. References: https://www.redhat.com/security/data/cve/CVE-2013-2035.html https://www.redhat.com/security/data/cve/CVE-2013-2192.html https://www.redhat.com/security/data/cve/CVE-2013-4152.html https://www.redhat.com/security/data/cve/CVE-2013-6429.html https://www.redhat.com/security/data/cve/CVE-2013-6430.html https://www.redhat.com/security/data/cve/CVE-2014-0050.html https://www.redhat.com/security/data/cve/CVE-2014-0054.html https://www.redhat.com/security/data/cve/CVE-2014-0085.html https://www.redhat.com/security/data/cve/CVE-2014-1904.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq&downloadType=distributions&version=6.1.0 https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_A-MQ/ 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTS/SnXlSAg2UNWIIRAjfhAJ9FI0X+7Dz06mH7UxBXwT82JEYWdACgn/2k ft7Xn9xiuZb/emiN+JXVSF4= =qShr -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.07

sources: NVD: CVE-2014-0050 // BID: 65400 // VULMON: CVE-2014-0050 // PACKETSTORM: 126007 // PACKETSTORM: 131089 // PACKETSTORM: 131856 // PACKETSTORM: 125109 // PACKETSTORM: 126754 // PACKETSTORM: 126052 // PACKETSTORM: 126404 // PACKETSTORM: 139721 // PACKETSTORM: 126143

AFFECTED PRODUCTS

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:09-50

Trust: 1.5

vendor:apachemodel:tomcatscope:eqversion:8.0.1

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.50

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.33

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.32

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.31

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.30

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.29

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.28

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.27

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.26

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.25

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.24

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.23

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.16

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.15

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.14

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.13

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.12

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.9

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.8

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.7

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.6

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.4

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.3

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.2

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.1

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.5

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.40

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.22

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.21

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.20

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.19

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.18

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.11

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:7.0.10

Trust: 1.3

vendor:apachemodel:commons fileuploadscope:eqversion:1.2.2

Trust: 1.3

vendor:apachemodel:commons fileuploadscope:eqversion:1.2.1

Trust: 1.3

vendor:apachemodel:commons fileuploadscope:eqversion:1.2

Trust: 1.3

vendor:apachemodel:commons fileuploadscope:eqversion:1.1.1

Trust: 1.3

vendor:apachemodel:commons fileuploadscope:eqversion:1.1

Trust: 1.3

vendor:apachemodel:commons fileuploadscope:eqversion:1.0

Trust: 1.3

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:09-50

Trust: 1.2

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-50

Trust: 1.2

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:09-00

Trust: 1.2

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-00

Trust: 1.2

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-50

Trust: 1.2

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:09-00

Trust: 1.2

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-00

Trust: 1.2

vendor:hitachimodel:ucosminexus application server )scope:eqversion:09-50

Trust: 1.2

vendor:oraclemodel:retail applicationsscope:eqversion:13.1

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.44

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.45

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.48

Trust: 1.0

vendor:oraclemodel:retail applicationsscope:eqversion:13.4

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.37

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.42

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.36

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.17

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.38

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.0

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.35

Trust: 1.0

vendor:oraclemodel:retail applicationsscope:eqversion:12.0in

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.46

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:8.0.0

Trust: 1.0

vendor:oraclemodel:retail applicationsscope:eqversion:12.0

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.43

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.39

Trust: 1.0

vendor:apachemodel:commons fileuploadscope:lteversion:1.3

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.47

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.49

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.41

Trust: 1.0

vendor:oraclemodel:retail applicationsscope:eqversion:14.0

Trust: 1.0

vendor:oraclemodel:retail applicationsscope:eqversion:13.0

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:7.0.34

Trust: 1.0

vendor:oraclemodel:retail applicationsscope:eqversion:13.2

Trust: 1.0

vendor:oraclemodel:retail applicationsscope:eqversion:13.3

Trust: 1.0

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-50

Trust: 0.9

vendor:hitachimodel:ucosminexus application server )scope:eqversion:09-00

Trust: 0.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-60

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-50-02

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform hp-uxscope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform (windows(x8scope:eqversion:09-00-03

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-00-03

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform hp-uxscope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform (windows(x6scope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform hp-uxscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-60

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-50-02

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server base (windows(x8scope:eqversion:09-00-03

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-00-03

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server base hp-uxscope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server base (windows(x6scope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server base hp-uxscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus developer )scope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus developer )scope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server-r )scope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus application server-r )scope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server hp-uxscope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus application server (windows(x8scope:eqversion:09-00-03

Trust: 0.6

vendor:hitachimodel:ucosminexus application server hp-uxscope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus application server (windows(x6scope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-00-02

Trust: 0.6

vendor:hitachimodel:ucosminexus application server hp-uxscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:programming environment for java )scope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:programming environment for java )scope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:cosminexus component containerscope:eqversion:09-50-03

Trust: 0.6

vendor:hitachimodel:cosminexus component container )scope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:cosminexus component container )scope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:cosminexus component container windowscope:neversion:09-50-04

Trust: 0.6

vendor:hitachimodel:cosminexus component containerscope:neversion:09-50-04

Trust: 0.6

vendor:vmwaremodel:vcenter serverscope:eqversion:5.5

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:5.1

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:5.0

Trust: 0.3

vendor:vmwaremodel:vcenter orchestratorscope:eqversion:5.5

Trust: 0.3

vendor:vmwaremodel:vcenter orchestratorscope:eqversion:5.1

Trust: 0.3

vendor:vmwaremodel:vcenter orchestratorscope:eqversion:4.2

Trust: 0.3

vendor:vmwaremodel:vcenter operations management suitescope:eqversion:5.8.1

Trust: 0.3

vendor:vmwaremodel:vcenter operations management suitescope:eqversion:5.7.1

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:13.10

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:12.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux 10.04.ltsscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 for vmwarescope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:11

Trust: 0.3

vendor:sapmodel:internet salesscope:eqversion:7.54

Trust: 0.3

vendor:sapmodel:internet salesscope:eqversion:7.33

Trust: 0.3

vendor:sapmodel:internet salesscope:eqversion:7.32

Trust: 0.3

vendor:sapmodel:internet salesscope:eqversion:7.31

Trust: 0.3

vendor:sapmodel:internet salesscope:eqversion:7.30

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:12.3

Trust: 0.3

vendor:redhatmodel:jboss operations networkscope:eqversion:3.2.1

Trust: 0.3

vendor:redhatmodel:jboss operations networkscope:eqversion:3.2.0

Trust: 0.3

vendor:redhatmodel:jboss fuse service worksscope:eqversion:6.0.0

Trust: 0.3

vendor:redhatmodel:jboss fusescope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server el6scope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server el5scope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:6.2.1

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:6.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el6scope:eqversion:6

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el5scope:eqversion:6

Trust: 0.3

vendor:redhatmodel:jboss brmsscope:eqversion:6.0.1

Trust: 0.3

vendor:redhatmodel:jboss brmsscope:eqversion:6.0.0

Trust: 0.3

vendor:redhatmodel:jboss bpmsscope:eqversion:6.0.1

Trust: 0.3

vendor:redhatmodel:jboss bpmsscope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:jboss a-mqscope:eqversion:6.0.0

Trust: 0.3

vendor:redhatmodel:fuse esb enterprisescope:eqversion:7.1.0

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server eus 6.5.zscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:weblogic portalscope:eqversion:10.3.6.0

Trust: 0.3

vendor:oraclemodel:webcenter sitesscope:eqversion:11.1.18.0

Trust: 0.3

vendor:oraclemodel:webcenter sitesscope:eqversion:7.6.2

Trust: 0.3

vendor:oraclemodel:webcenter sitesscope:eqversion:11.1.1.6.1

Trust: 0.3

vendor:oraclemodel:retail returns management rm2.0scope: - version: -

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.4

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.3

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.2

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:13.1

Trust: 0.3

vendor:oraclemodel:retail returns management 12.0inscope: - version: -

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:retail open commerce platformscope:eqversion:3.0

Trust: 0.3

vendor:oraclemodel:retail central office rm2.0scope: - version: -

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.4

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.3

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.2

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.1

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:retail central office 12.0inscope: - version: -

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:retail back office rm2.0scope: - version: -

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.4

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.3

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.2

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.1

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:retail back office 12.0inscope: - version: -

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:mysql enterprise monitorscope:eqversion:3.0.10

Trust: 0.3

vendor:oraclemodel:mysql enterprise monitorscope:eqversion:3.0

Trust: 0.3

vendor:oraclemodel:mysql enterprise monitorscope:eqversion:2.3.16

Trust: 0.3

vendor:oraclemodel:mysql enterprise monitorscope:eqversion:2.3.15

Trust: 0.3

vendor:oraclemodel:mysql enterprise monitorscope:eqversion:2.3.14

Trust: 0.3

vendor:oraclemodel:mysql enterprise monitorscope:eqversion:2.3.13

Trust: 0.3

vendor:oraclemodel:mysql enterprise monitorscope:eqversion:2.3

Trust: 0.3

vendor:oraclemodel:health sciences empirica studyscope:eqversion:3.1.2.0

Trust: 0.3

vendor:oraclemodel:health sciences empirica signalscope:eqversion:7.3.3.3

Trust: 0.3

vendor:oraclemodel:health sciences empirica inspectionsscope:eqversion:1.0.1.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:endeca information discovery studioscope:eqversion:2.2.2

Trust: 0.3

vendor:oraclemodel:endeca information discovery studioscope:eqversion:3.1

Trust: 0.3

vendor:oraclemodel:endeca information discovery studioscope:eqversion:3.0

Trust: 0.3

vendor:oraclemodel:endeca information discovery studioscope:eqversion:2.4

Trust: 0.3

vendor:oraclemodel:endeca information discovery studioscope:eqversion:2.3

Trust: 0.3

vendor:oraclemodel:communications service broker engineered system editionscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:communications service brokerscope:eqversion:6.1

Trust: 0.3

vendor:oraclemodel:communications service brokerscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:communications policy managementscope:eqversion:12.1.1

Trust: 0.3

vendor:oraclemodel:communications policy managementscope:eqversion:10.4.1

Trust: 0.3

vendor:oraclemodel:communications policy managementscope:eqversion:9.9.1

Trust: 0.3

vendor:oraclemodel:communications policy managementscope:eqversion:9.7.3

Trust: 0.3

vendor:oraclemodel:communications online mediation controllerscope:eqversion:6.1

Trust: 0.3

vendor:oraclemodel:communications converged application server service controllerscope:eqversion:6.1

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:4.2.1

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:3.2.1.00.10

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:2.2.1

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:1.1.3

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:1.1.2

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:1.1.1

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:4.2

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:4.1

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:4.0

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:3.2.0.00.27

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:3.2

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:2.2

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:2.1

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:2.0

Trust: 0.3

vendor:oraclemodel:application expressscope:eqversion:1.5

Trust: 0.3

vendor:oraclemodel:application express 1.1-eascope: - version: -

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:websphere portalscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:websphere message broker for z/osscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:websphere message brokerscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:websphere message brokerscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:websphere lombardi editionscope:eqversion:7.2.0

Trust: 0.3

vendor:ibmmodel:websphere lombardi editionscope:eqversion:7.1.0

Trust: 0.3

vendor:ibmmodel:websphere extended deployment compute gridscope:eqversion:8.0.0.0

Trust: 0.3

vendor:ibmmodel:websphere extended deployment computescope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:websphere dashboard frameworkscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:websphere business monitorscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:web experience factoryscope:eqversion:8.5.0.0

Trust: 0.3

vendor:ibmmodel:web experience factoryscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:web experience factoryscope:eqversion:7.0.1

Trust: 0.3

vendor:ibmmodel:web experience factoryscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:urbancode releasescope:eqversion:6.0.1

Trust: 0.3

vendor:ibmmodel:urbancode releasescope:eqversion:6.0.1.3

Trust: 0.3

vendor:ibmmodel:urbancode releasescope:eqversion:6.0.1.2

Trust: 0.3

vendor:ibmmodel:urbancode releasescope:eqversion:6.0.1.1

Trust: 0.3

vendor:ibmmodel:urbancode releasescope:eqversion:6.0.0.1

Trust: 0.3

vendor:ibmmodel:urbancode releasescope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:urbancode deployscope:eqversion:6.0.13

Trust: 0.3

vendor:ibmmodel:urbancode deployscope:eqversion:6.0.12

Trust: 0.3

vendor:ibmmodel:urbancode deployscope:eqversion:6.0.11

Trust: 0.3

vendor:ibmmodel:urbancode deployscope:eqversion:6.0.1

Trust: 0.3

vendor:ibmmodel:urbancode deployscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:tivoli storage manager operations centerscope:eqversion:7.1100

Trust: 0.3

vendor:ibmmodel:tivoli storage manager operations centerscope:eqversion:7.1000

Trust: 0.3

vendor:ibmmodel:tivoli storage manager operations centerscope:eqversion:6.4.1000

Trust: 0.3

vendor:ibmmodel:tivoli storage manager operations centerscope:eqversion:6.4100

Trust: 0.3

vendor:ibmmodel:tivoli remote controlscope:eqversion:5.1.2

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:8.2.1

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:9.0.1

Trust: 0.3

vendor:ibmmodel:tivoli endpoint manager for remote controlscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:tivoli endpoint managerscope:eqversion:8.2.1

Trust: 0.3

vendor:ibmmodel:tivoli endpoint managerscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:tivoli endpoint managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for application diagnosticsscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:tivoli asset discovery for distributedscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:tivoli asset discovery for distributedscope:eqversion:7.2.2.0

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2.21

Trust: 0.3

vendor:ibmmodel:support assistantscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.40

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.3.20

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.4.3.2

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.4.2.1

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.4.2.0

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.4.1.1

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.4.1.0

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.4.0.4

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.3.2.3

Trust: 0.3

vendor:ibmmodel:storwize unified softwarescope:eqversion:v70001.3.0.0

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.1.7

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.1.6

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.1.5

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.1.2

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.1.0

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.1

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.0.6

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.0.0

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.4.0

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:eqversion:3.3.01

Trust: 0.3

vendor:ibmmodel:sterling control centerscope:eqversion:5.41

Trust: 0.3

vendor:ibmmodel:sterling control centerscope:eqversion:5.4.1

Trust: 0.3

vendor:ibmmodel:sterling control centerscope:eqversion:5.4

Trust: 0.3

vendor:ibmmodel:sterling control centerscope:eqversion:5.3

Trust: 0.3

vendor:ibmmodel:sterling control centerscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:sametime proxy server and web clientscope:eqversion:9.0.0.1

Trust: 0.3

vendor:ibmmodel:sametime proxy server and web clientscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:sametime meeting serverscope:eqversion:9.0.0.1

Trust: 0.3

vendor:ibmmodel:sametime meeting serverscope:eqversion:9.0.0

Trust: 0.3

vendor:ibmmodel:sametime meeting serverscope:eqversion:8.5.2.1

Trust: 0.3

vendor:ibmmodel:sametime meeting serverscope:eqversion:8.5.2

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0.5

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0.4

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0.3

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0.2

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:3.0.16

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:3.0.1.2

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:2.02

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:2.01

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0.6

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0.0.1

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:3.0.1.5

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:3.0.1.4

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:3.0.1.3

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:3.0.1

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:rational team concertscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0.3

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0.2

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:3.0.1

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:3.01

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0.6

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0.5

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0.4

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:3.0.0

Trust: 0.3

vendor:ibmmodel:rational software architect design managerscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:4.0.4

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:4.0.3

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:4.0.2

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:4.0.6

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:4.0.5

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:3.0.1

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:3.0.0.1

Trust: 0.3

vendor:ibmmodel:rational rhapsody design managerscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.5

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.4

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.3

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:rational requirements composer ifix1scope:eqversion:3.0.16

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:3.0.16

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:3.0.1.2

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:2.04

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:2.02

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:2.01

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.6

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.2

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.0.2

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.0.1

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:3.0.1

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:2.0.0.3

Trust: 0.3

vendor:ibmmodel:rational requirements composerscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:rational engineering lifecycle managerscope:eqversion:4.0.5

Trust: 0.3

vendor:ibmmodel:rational engineering lifecycle managerscope:eqversion:4.0.4

Trust: 0.3

vendor:ibmmodel:rational engineering lifecycle managerscope:eqversion:4.0.3

Trust: 0.3

vendor:ibmmodel:rational engineering lifecycle managerscope:eqversion:4.0.6

Trust: 0.3

vendor:ibmmodel:rational engineering lifecycle managerscope:eqversion:1.0.0.1

Trust: 0.3

vendor:ibmmodel:rational engineering lifecycle managerscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:rational doors next generationscope:eqversion:4.0.5

Trust: 0.3

vendor:ibmmodel:rational doors next generationscope:eqversion:4.0.4

Trust: 0.3

vendor:ibmmodel:rational doors next generationscope:eqversion:4.0.3

Trust: 0.3

vendor:ibmmodel:rational doors next generationscope:eqversion:4.0.2

Trust: 0.3

vendor:ibmmodel:rational doors next generationscope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:rational doors next generationscope:eqversion:4.0.6

Trust: 0.3

vendor:ibmmodel:rational doors next generationscope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:7.0.2

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:operational decision managerscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:omnifind enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:lotus widget factoryscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:lotus mashupsscope:eqversion:3.0.0.1

Trust: 0.3

vendor:ibmmodel:lotus mashupsscope:eqversion:2.0.0.2

Trust: 0.3

vendor:ibmmodel:license metric toolscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:license metric toolscope:eqversion:7.2.2

Trust: 0.3

vendor:ibmmodel:interactscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:interactscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:integration bus for z/osscope:eqversion:9.0.0.0

Trust: 0.3

vendor:ibmmodel:integration busscope:eqversion:9.0.0.0

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.7

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.5

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.2

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:10.1

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:infosphere master data management serverscope:eqversion:10.1

Trust: 0.3

vendor:ibmmodel:infosphere master data management serverscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:infosphere master data managementscope:eqversion:11.0

Trust: 0.3

vendor:ibmmodel:infosphere mashuphubscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:infosphere mashuphubscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:infosphere guardium data redactionscope:eqversion:2.5

Trust: 0.3

vendor:ibmmodel:business monitorscope:eqversion:7.5.1

Trust: 0.3

vendor:ibmmodel:business monitorscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:forms serverscope:eqversion:8.0.1

Trust: 0.3

vendor:ibmmodel:forms serverscope:eqversion:4.02

Trust: 0.3

vendor:ibmmodel:forms serverscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:forms serverscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:forms experience builderscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:forms experience builderscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:flashsystem 9848-ae1scope:eqversion:v840

Trust: 0.3

vendor:ibmmodel:flashsystem 9848-ac1scope:eqversion:v840

Trust: 0.3

vendor:ibmmodel:flashsystem 9848-ac0scope:eqversion:v840

Trust: 0.3

vendor:ibmmodel:flashsystem 9846-ae1scope:eqversion:v840

Trust: 0.3

vendor:ibmmodel:flashsystem 9846-ac1scope:eqversion:v840

Trust: 0.3

vendor:ibmmodel:flashsystem 9846-ac0scope:eqversion:v840

Trust: 0.3

vendor:ibmmodel:flashsystem 9840-ae1scope:eqversion:v840

Trust: 0.3

vendor:ibmmodel:flashsystem 9848-ae1scope:eqversion:840

Trust: 0.3

vendor:ibmmodel:flashsystem 9846-ae1scope:eqversion:840

Trust: 0.3

vendor:ibmmodel:flashsystem 9843-ae1scope:eqversion:840

Trust: 0.3

vendor:ibmmodel:flashsystem 9840-ae1scope:eqversion:840

Trust: 0.3

vendor:ibmmodel:flashsystemscope:eqversion:8400

Trust: 0.3

vendor:ibmmodel:filenet services for lotus quickrscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:filenet p8 application enginescope:eqversion:4.0.2

Trust: 0.3

vendor:ibmmodel:filenet content manager workplace xtscope:eqversion:1.1.5

Trust: 0.3

vendor:ibmmodel:filenet content manager workplace xtscope:eqversion:1.1.4

Trust: 0.3

vendor:ibmmodel:filenet content manager workplace xtscope:eqversion:1.1.3

Trust: 0.3

vendor:ibmmodel:filenet content manager workplace xtscope:eqversion:1.1.2

Trust: 0.3

vendor:ibmmodel:filenet content manager workplace xtscope:eqversion:1.1.1

Trust: 0.3

vendor:ibmmodel:filenet content managerscope:eqversion:5.2.0

Trust: 0.3

vendor:ibmmodel:filenet collaboration servicesscope:eqversion:2.0.2

Trust: 0.3

vendor:ibmmodel:filenet business process frameworkscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:endpoint manager for remote controlscope:eqversion:9.1.0

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:distributed marketingscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:db2 query management facility for websphere fix packscope:eqversion:9.122

Trust: 0.3

vendor:ibmmodel:db2 query management facility for webspherescope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:db2 query management facility for websphere fix packscope:eqversion:11.11

Trust: 0.3

vendor:ibmmodel:db2 query management facility for webspherescope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:db2 query management facility for websphere fix packscope:eqversion:10.19

Trust: 0.3

vendor:ibmmodel:db2 query management facility for webspherescope:eqversion:10.1

Trust: 0.3

vendor:ibmmodel:dataquantscope:eqversion:2.1.1

Trust: 0.3

vendor:ibmmodel:dataquantscope:eqversion:1.2.19

Trust: 0.3

vendor:ibmmodel:content manager services for lotus quickrscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:content manager services for lotus quickrscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:content integratorscope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:content integratorscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:content foundationscope:eqversion:5.2.0

Trust: 0.3

vendor:ibmmodel:content analytics with enterprise searchscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:content analytics with enterprise searchscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:4.5

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:3.0.1.1

Trust: 0.3

vendor:ibmmodel:connectionsscope:eqversion:3.0.1.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.6

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.4

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.5

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.4

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.3

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.2

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:5.2.6

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:5.2.5

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:5.2.4

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:5.2.1

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.5.4

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.5.3

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.5.2

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.4.5

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.4.4

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:6.0.4.3

Trust: 0.3

vendor:ibmmodel:cúram social program managementscope:eqversion:4.5

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.5.0

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:7.5.0

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.5.0

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.0.0

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:7.5.0

Trust: 0.3

vendor:ibmmodel:business process manager advanced on z/osscope:eqversion:8.5.0

Trust: 0.3

vendor:ibmmodel:business process manager advanced on z/osscope:eqversion:8.0.0

Trust: 0.3

vendor:ibmmodel:business process manager advanced on z/osscope:eqversion:7.5.0

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:8.0.0

Trust: 0.3

vendor:ibmmodel:business process manager advancedscope:eqversion:7.5.0

Trust: 0.3

vendor:ibmmodel:business monitorscope:eqversion:8.0.1

Trust: 0.3

vendor:huaweimodel:usg9580 v200r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:usg9560 v200r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:usg9520 v200r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:eudemon8000e-x8 v200r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:eudemon8000e-x3 v200r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:eudemon8000e-x16 v200r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:espace meeting portal v100r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:anyoffice v200r002c10spc500scope: - version: -

Trust: 0.3

vendor:huaweimodel:antiddos v100r001c00scope:eqversion:8080

Trust: 0.3

vendor:huaweimodel:antiddos v100r001c00scope:eqversion:8060

Trust: 0.3

vendor:huaweimodel:antiddos v100r001c00scope:eqversion:8030

Trust: 0.3

vendor:huaweimodel:antiddos 500-d v100r001c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:antiddos v100r001c00scope:eqversion:1550

Trust: 0.3

vendor:huaweimodel:antiddos v100r001c00scope:eqversion:1520

Trust: 0.3

vendor:hpmodel:sitescope monitors 11.32ip1scope: - version: -

Trust: 0.3

vendor:hpmodel:sitescope monitorsscope:eqversion:11.20

Trust: 0.3

vendor:hpmodel:sdn van controllerscope:eqversion:2.5

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:7.5.1

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:7.5

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:7.4

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:7.3

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform (windows(x6scope:eqversion:09-50-01

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-60

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect hp-uxscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect (windows(x8scope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect hp-uxscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect (windows(x6scope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus service architect hp-uxscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base (windows(x6scope:eqversion:09-50-01

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server base hp-uxscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus developer )scope:eqversion:0109-50

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-60

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus developer (windows(x6scope:eqversion:09-50-01

Trust: 0.3

vendor:hitachimodel:ucosminexus developer hp-uxscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus developer (windows(x8scope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus developer hp-uxscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus developer (windows(x6scope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus developer hp-uxscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-60

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-r hp-uxscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-r (windows(x8scope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-r hp-uxscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-r (windows(x6scope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server-r hp-uxscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-60

Trust: 0.3

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:programming environment for java hp-uxscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:programming environment for javascope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:programming environment for java (windows(x8scope:eqversion:09-00-03

Trust: 0.3

vendor:hitachimodel:programming environment for java hp-uxscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:programming environment for java (windows(x6scope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:programming environment for javascope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:programming environment for java hp-uxscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:programming environment for javascope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-10-03

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-10

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-02-04

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-02

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-01-03

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-01-02

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-01-01

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-01

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-00-02

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-00-01

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-10-00

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-51-05

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-51-04

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-51-03

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-51-02

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-51-01

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-51

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-50-03

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-50-02

Trust: 0.3

vendor:hitachimodel:jp1/it desktop management managerscope:eqversion:-09-50

Trust: 0.3

vendor:hitachimodel:job management partner 1/it desktop management managerscope:eqversion:-10-01-06

Trust: 0.3

vendor:hitachimodel:job management partner 1/it desktop management managerscope:eqversion:-10-01-03

Trust: 0.3

vendor:hitachimodel:job management partner 1/it desktop management managerscope:eqversion:-10-01

Trust: 0.3

vendor:hitachimodel:job management partner 1/it desktop management managerscope:eqversion:-09-50-03

Trust: 0.3

vendor:hitachimodel:job management partner 1/it desktop management managerscope:eqversion:-09-50-02

Trust: 0.3

vendor:hitachimodel:job management partner 1/it desktop management managerscope:eqversion:-09-50-01

Trust: 0.3

vendor:hitachimodel:job management partner 1/it desktop management managerscope:eqversion:-09-50

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:04-00-06

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:04-00-02

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:04-00-01

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:04-00

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-12

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-11

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-10

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-09

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-08

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-07

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-06

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-04

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-03

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00-01

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:03-00

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-07

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-06

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-05

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-04

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-03

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-02

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-01

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:03-02

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:03-01-02

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:03-01-01

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:03-01

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53-02

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53-01

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51-01

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-01

Trust: 0.3

vendor:hitachimodel:cosminexus component container hp-uxscope:eqversion:09-50-03

Trust: 0.3

vendor:hitachimodel:cosminexus component container (windows(x8scope:eqversion:09-50-03

Trust: 0.3

vendor:hitachimodel:cosminexus component container (windows(x6scope:eqversion:09-50-03

Trust: 0.3

vendor:hitachimodel:cosminexus component container hp-uxscope:eqversion:09-50-01

Trust: 0.3

vendor:hitachimodel:cosminexus component containerscope:eqversion:09-50-01

Trust: 0.3

vendor:hitachimodel:cosminexus component containerscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:cosminexus component container (windows(x8scope:eqversion:09-00-10

Trust: 0.3

vendor:hitachimodel:cosminexus component container (windows(x6scope:eqversion:09-00-10

Trust: 0.3

vendor:hitachimodel:cosminexus component containerscope:eqversion:09-00-10

Trust: 0.3

vendor:hitachimodel:cosminexus component container hp-uxscope:eqversion:09-00-08

Trust: 0.3

vendor:hitachimodel:cosminexus component containerscope:eqversion:09-00-08

Trust: 0.3

vendor:hitachimodel:cosminexus component containerscope:eqversion:09-00-02

Trust: 0.3

vendor:hitachimodel:cosminexus component container hp-uxscope:eqversion:09-00-01

Trust: 0.3

vendor:hitachimodel:cosminexus component containerscope:eqversion:09-00

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:3.1.1

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:3.1

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:3.0

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:2.3

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:2.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip wom hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip wom hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip wom hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip wom hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip wom hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip psm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip psm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip psm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip psm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip psm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip pem hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip ltm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip ltm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip ltm hf4scope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip link controller hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip link controller hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip link controller hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip gtm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip edge gateway hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.0.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.40

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.0.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip asm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip asm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip asm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip asm hf5scope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip asm hf4scope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.4.0

Trust: 0.3

vendor:f5model:big-ip apm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip apm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apm hf4scope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip analytics hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip analytics hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip analytics hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip analytics 11.0.0-hf2scope: - version: -

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.0.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip afm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:avayamodel:ip office server editionscope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:ip office application server spscope:eqversion:9.02

Trust: 0.3

vendor:avayamodel:ip office application server spscope:eqversion:9.01

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:7.0

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:eqversion:6.0.2

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:eqversion:6.0.1

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:eqversion:6.3.0

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:eqversion:6.2.0

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:eqversion:6.1.3

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:eqversion:6.1.0

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:7.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0

Trust: 0.3

vendor:apachemodel:tomcat 8.0.0-rc1scope: - version: -

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:7.0.4

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:7.0.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:20

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.41

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.4

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.2.3

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.2.11

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.8.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.8

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.6

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.5

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.14

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.12

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.11.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.11.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.11

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.10

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.9

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.8

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.7

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.6

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.5

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.4

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.3

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.8

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.7

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.3

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.16

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.15.3

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.15.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.15.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.15

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.14.3

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.14.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.14.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.14

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.12

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.1.2

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.1.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.3.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.2.3.1

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.4

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.1.3

Trust: 0.3

vendor:apachemodel:strutsscope:eqversion:2.0.13

Trust: 0.3

vendor:apachemodel:commons fileuploadscope:eqversion:1.3

Trust: 0.3

vendor:vmwaremodel:vcenter server updatescope:neversion:5.52

Trust: 0.3

vendor:vmwaremodel:vcenter operations management suitescope:neversion:5.8.2

Trust: 0.3

vendor:vmwaremodel:vcenter operations management suitescope:neversion:5.7.3

Trust: 0.3

vendor:redhatmodel:jboss fusescope:neversion:6.1.0

Trust: 0.3

vendor:redhatmodel:jboss a-mqscope:neversion:6.1.0

Trust: 0.3

vendor:ibmmodel:urbancode releasescope:neversion:6.0.1.4

Trust: 0.3

vendor:ibmmodel:urbancode deployscope:neversion:6.0.14

Trust: 0.3

vendor:ibmmodel:tivoli storage manager operations centerscope:neversion:7.1200

Trust: 0.3

vendor:ibmmodel:tivoli storage manager operations centerscope:neversion:6.4.2000

Trust: 0.3

vendor:ibmmodel:sterling secure proxyscope:neversion:3.4.1.8

Trust: 0.3

vendor:ibmmodel:infosphere guardium data redactionscope:neversion:2.5.1

Trust: 0.3

vendor:ibmmodel:filenet business process frameworkscope:neversion:4.1.0.10

Trust: 0.3

vendor:ibmmodel:db2 query management facility for websphere fix packscope:neversion:9.123

Trust: 0.3

vendor:ibmmodel:db2 query management facility for websphere fix packscope:neversion:11.12

Trust: 0.3

vendor:ibmmodel:db2 query management facility for websphere fix packscope:neversion:10.110

Trust: 0.3

vendor:ibmmodel:dataquantscope:neversion:2.1.2

Trust: 0.3

vendor:ibmmodel:dataquantscope:neversion:1.2.20

Trust: 0.3

vendor:ibmmodel:connections cr1scope:neversion:5.0

Trust: 0.3

vendor:huaweimodel:espace meeting portal v100r001c00spc303scope:neversion: -

Trust: 0.3

vendor:huaweimodel:anyoffice v200r002c10l00422scope:neversion: -

Trust: 0.3

vendor:huaweimodel:antiddos v100r001c00sph503scope:neversion:8000

Trust: 0.3

vendor:hitachimodel:cosminexus component container hp-uxscope:neversion:09-50-04

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:neversion:6.3.2

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:neversion:6.2.6

Trust: 0.3

vendor:arubanetworksmodel:clearpassscope:neversion:6.1.4

Trust: 0.3

vendor:apachemodel:strutsscope:neversion:2.3.16.1

Trust: 0.3

sources: BID: 65400 // NVD: CVE-2014-0050

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0050
value: HIGH

Trust: 1.0

VULMON: CVE-2014-0050
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0050
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

sources: VULMON: CVE-2014-0050 // NVD: CVE-2014-0050

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.0

sources: NVD: CVE-2014-0050

THREAT TYPE

network

Trust: 0.3

sources: BID: 65400

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 65400

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-0050

PATCH

title:Debian Security Advisories: DSA-2856-1 libcommons-fileupload-java -- denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=642945afda91c20bf7efbc771575262b

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-312url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-312

Trust: 0.1

title:Ubuntu Security Notice: tomcat6, tomcat7 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2130-1

Trust: 0.1

title:IBM: Security Bulletin: A vulnerability in Apache Commons Fileupload affects IBM Tivoli Business Service Manager (CVE-2013-2186, CVE-2013-0248, CVE-2016-3092, CVE-2014-0050, 220723)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=8bc75a85691b82e540dfdc9fe13fab57

Trust: 0.1

title:Debian Security Advisories: DSA-2897-1 tomcat7 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=2d279d06ad61c5b596d45790e28df427

Trust: 0.1

title:Debian CVElist Bug Report Logs: tomcat7: CVE-2013-2071url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=94f2b1959436d579ea8b492b708008b8

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-344url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-344

Trust: 0.1

title:Symantec Security Advisories: SA100 : Apache Tomcat Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=94a4a81a426ea8a524a402abe366c375

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4b527561ba1a5de7a529c8a93679f585

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Privileged Identity Manager is affected by multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=8580d3cd770371e2ef0f68ca624b80b0

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c

Trust: 0.1

title: - url:https://github.com/Shiverino/NPE2223

Trust: 0.1

title:cve-2014-0050url:https://github.com/jrrdev/cve-2014-0050

Trust: 0.1

title:victims-version-searchurl:https://github.com/adedov/victims-version-search

Trust: 0.1

title:-maven-security-versionsurl:https://github.com/nagauker/-maven-security-versions

Trust: 0.1

title:maven-security-versions-Travisurl:https://github.com/klee94/maven-security-versions-Travis

Trust: 0.1

title:victimsurl:https://github.com/alexsh88/victims

Trust: 0.1

title:victimsurl:https://github.com/tmpgit3000/victims

Trust: 0.1

title:maven-security-versionsurl:https://github.com/victims/maven-security-versions

Trust: 0.1

title:CDLurl:https://github.com/NCSU-DANCE-Research-Group/CDL

Trust: 0.1

title:Classified-Distributed-Learning-for-Detecting-Security-Attacks-in-Containerized-Applicationsurl:https://github.com/yuhang-lin/Classified-Distributed-Learning-for-Detecting-Security-Attacks-in-Containerized-Applications

Trust: 0.1

title:Threatposturl:https://threatpost.com/vmware-patches-apache-struts-flaws-in-vcops/106858/

Trust: 0.1

sources: VULMON: CVE-2014-0050

EXTERNAL IDS

db:NVDid:CVE-2014-0050

Trust: 2.3

db:JVNid:JVN14876762

Trust: 1.4

db:HITACHIid:HS14-015

Trust: 1.4

db:HITACHIid:HS14-017

Trust: 1.4

db:HITACHIid:HS14-016

Trust: 1.4

db:BIDid:65400

Trust: 1.4

db:SECUNIAid:59232

Trust: 1.1

db:SECUNIAid:59399

Trust: 1.1

db:SECUNIAid:59185

Trust: 1.1

db:SECUNIAid:59187

Trust: 1.1

db:SECUNIAid:59039

Trust: 1.1

db:SECUNIAid:59500

Trust: 1.1

db:SECUNIAid:59184

Trust: 1.1

db:SECUNIAid:60475

Trust: 1.1

db:SECUNIAid:59041

Trust: 1.1

db:SECUNIAid:59183

Trust: 1.1

db:SECUNIAid:58075

Trust: 1.1

db:SECUNIAid:58976

Trust: 1.1

db:SECUNIAid:59492

Trust: 1.1

db:SECUNIAid:59725

Trust: 1.1

db:SECUNIAid:60753

Trust: 1.1

db:SECUNIAid:57915

Trust: 1.1

db:JVNDBid:JVNDB-2014-000017

Trust: 1.1

db:PACKETSTORMid:127215

Trust: 1.1

db:HITACHIid:HS14-008

Trust: 0.3

db:EXPLOIT-DBid:31615

Trust: 0.1

db:VULMONid:CVE-2014-0050

Trust: 0.1

db:PACKETSTORMid:126007

Trust: 0.1

db:PACKETSTORMid:131089

Trust: 0.1

db:PACKETSTORMid:131856

Trust: 0.1

db:PACKETSTORMid:125109

Trust: 0.1

db:PACKETSTORMid:126754

Trust: 0.1

db:PACKETSTORMid:126052

Trust: 0.1

db:PACKETSTORMid:126404

Trust: 0.1

db:PACKETSTORMid:139721

Trust: 0.1

db:PACKETSTORMid:126143

Trust: 0.1

sources: VULMON: CVE-2014-0050 // BID: 65400 // PACKETSTORM: 126007 // PACKETSTORM: 131089 // PACKETSTORM: 131856 // PACKETSTORM: 125109 // PACKETSTORM: 126754 // PACKETSTORM: 126052 // PACKETSTORM: 126404 // PACKETSTORM: 139721 // PACKETSTORM: 126143 // NVD: CVE-2014-0050

REFERENCES

url:http://jvn.jp/en/jp/jvn14876762/index.html

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2014-0400.html

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676410

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676401

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677724

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675432

Trust: 1.4

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-016/index.html

Trust: 1.4

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-017/index.html

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676403

Trust: 1.4

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-015/index.html

Trust: 1.4

url:http://www.vmware.com/security/advisories/vmsa-2014-0007.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.4

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.4

url:http://www.vmware.com/security/advisories/vmsa-2014-0008.html

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2014-0253.html

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2014-0252.html

Trust: 1.4

url:http://tomcat.apache.org/security-8.html

Trust: 1.2

url:http://svn.apache.org/r1565143

Trust: 1.2

url:http://tomcat.apache.org/security-7.html

Trust: 1.2

url:http://advisories.mageia.org/mgasa-2014-0110.html

Trust: 1.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=1062337

Trust: 1.1

url:http://jvndb.jvn.jp/jvndb/jvndb-2014-000017

Trust: 1.1

url:http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html

Trust: 1.1

url:http://secunia.com/advisories/57915

Trust: 1.1

url:http://secunia.com/advisories/58976

Trust: 1.1

url:http://secunia.com/advisories/59232

Trust: 1.1

url:http://secunia.com/advisories/59183

Trust: 1.1

url:http://secunia.com/advisories/59500

Trust: 1.1

url:http://secunia.com/advisories/58075

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676853

Trust: 1.1

url:http://secunia.com/advisories/59187

Trust: 1.1

url:http://secunia.com/advisories/59041

Trust: 1.1

url:http://secunia.com/advisories/59185

Trust: 1.1

url:http://secunia.com/advisories/59492

Trust: 1.1

url:http://www.securityfocus.com/bid/65400

Trust: 1.1

url:http://secunia.com/advisories/59039

Trust: 1.1

url:http://secunia.com/advisories/59725

Trust: 1.1

url:http://secunia.com/advisories/59399

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676656

Trust: 1.1

url:http://packetstormsecurity.com/files/127215/vmware-security-advisory-2014-0007.html

Trust: 1.1

url:http://secunia.com/advisories/59184

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676405

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Trust: 1.1

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm

Trust: 1.1

url:http://secunia.com/advisories/60475

Trust: 1.1

url:http://secunia.com/advisories/60753

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677691

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21681214

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2014-0012.html

Trust: 1.1

url:http://seclists.org/fulldisclosure/2014/dec/23

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:084

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676091

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676092

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21669554

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=143136844732487&w=2

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05324755

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05376917

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2130-1

Trust: 1.1

url:http://www.debian.org/security/2014/dsa-2856

Trust: 1.1

url:http://www.securityfocus.com/archive/1/534161/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/532549/100/0/threaded

Trust: 1.1

url:https://security.gentoo.org/glsa/202107-39

Trust: 1.1

url:http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3c52f373fc.9030907%40apache.org%3e

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0050

Trust: 0.9

url:https://rhn.redhat.com/errata/rhsa-2014-0401.html

Trust: 0.4

url:https://rhn.redhat.com/errata/rhsa-2014-0373.html

Trust: 0.4

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05324755

Trust: 0.4

url:https://rhn.redhat.com/errata/rhsa-2014-0527.html

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0050.html

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://downloads.avaya.com/css/p8/documents/100179973

Trust: 0.3

url:http://seclists.org/fulldisclosure/2014/feb/41

Trust: 0.3

url:http://www.apache.org/

Trust: 0.3

url:http://struts.apache.org/release/2.3.x/docs/s2-020.html

Trust: 0.3

url:http://www.arubanetworks.com/support/alerts/aid-051414.asc

Trust: 0.3

url:http://tomcat.apache.org/

Trust: 0.3

url:http://commons.apache.org/proper/commons-fileupload//

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21668731

Trust: 0.3

url:http://support.f5.com/kb/en-us/solutions/public/15000/100/sol15189.html

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004740

Trust: 0.3

url:http://seclists.org/bugtraq/2014/jun/151

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680564

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100178813

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21682645

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21669383

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675470

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21671261

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-008/index.html

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04657823

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05376917

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680714

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21669021

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037189

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21671330

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673004

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678830

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0459.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0525.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0526.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0528.html

Trust: 0.3

url:https://launchpad.support.sap.com/#/notes/2629535

Trust: 0.3

url:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=497256000

Trust: 0.3

url:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=495289255

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0429.html

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-350733.htm

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676853

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678364

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21678373

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21684861

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21684286

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21672321

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678359

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21681214,swg21680564

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21670373

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21670400

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21682055

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004813

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21688411

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21670769

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21680366

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21671527

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21666799

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674439

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673701

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21672717

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21667254

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676092

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676091

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673260

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673682

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673581

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004858

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004859

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21672032

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21669020

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21671201

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21671653

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004819

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21668978

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21671684

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-4286

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-4322

Trust: 0.3

url:https://www.redhat.com/security/data/cve/cve-2013-4286.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-6429

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://github.com/shiverino/npe2223

Trust: 0.1

url:https://github.com/jrrdev/cve-2014-0050

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/31615/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=32760

Trust: 0.1

url:https://usn.ubuntu.com/2130-1/

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=brms&downloadtype=securitypatches&version=6.0.1

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=bpm.suite&downloadtype=securitypatches&version=6.0.1

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4322

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0075

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0099

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0227

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0050

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0119

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0119

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0096

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0149.html

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0268.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0075

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4590

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4590

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0099

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0096

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0227

Trust: 0.1

url:http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=em

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2122

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:http://svn.apache.org/r1565163

Trust: 0.1

url:http://svn.apache.org/r1565169

Trust: 0.1

url:http://www.enigmail.net/

Trust: 0.1

url:http://markmail.org/message/kpfl7ax4el2owb3o

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=2.0.1

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-4322.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2071

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2067

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0002

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-7285.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0003

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=fuse.mq.enterprise&downloadtype=securitypatches&version=7.1.0

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0002.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7285

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=fuse.esb.enterprise&downloadtype=securitypatches&version=7.1.0

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0452.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-6440.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0003.html

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6440

Trust: 0.1

url:https://softwaresupport.hpe.com>.

Trust: 0.1

url:https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0114

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0763

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3253

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0107

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5652

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-1904.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-6430.html

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.amq&downloadtype=distributions&version=6.1.0

Trust: 0.1

url:https://access.redhat.com/site/documentation/en-us/red_hat_jboss_a-mq/

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-6429.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6430

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1904

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2035

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-4152.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0054.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0085.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0085

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2035.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2013-2192.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0054

Trust: 0.1

sources: VULMON: CVE-2014-0050 // BID: 65400 // PACKETSTORM: 126007 // PACKETSTORM: 131089 // PACKETSTORM: 131856 // PACKETSTORM: 125109 // PACKETSTORM: 126754 // PACKETSTORM: 126052 // PACKETSTORM: 126404 // PACKETSTORM: 139721 // PACKETSTORM: 126143 // NVD: CVE-2014-0050

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 126007 // PACKETSTORM: 126754 // PACKETSTORM: 126404 // PACKETSTORM: 126143

SOURCES

db:VULMONid:CVE-2014-0050
db:BIDid:65400
db:PACKETSTORMid:126007
db:PACKETSTORMid:131089
db:PACKETSTORMid:131856
db:PACKETSTORMid:125109
db:PACKETSTORMid:126754
db:PACKETSTORMid:126052
db:PACKETSTORMid:126404
db:PACKETSTORMid:139721
db:PACKETSTORMid:126143
db:NVDid:CVE-2014-0050

LAST UPDATE DATE

2024-11-03T21:59:02.267000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-0050date:2023-11-07T00:00:00
db:BIDid:65400date:2018-07-12T06:00:00
db:NVDid:CVE-2014-0050date:2023-11-07T02:18:06.260

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-0050date:2014-04-01T00:00:00
db:BIDid:65400date:2014-02-06T00:00:00
db:PACKETSTORMid:126007date:2014-04-03T14:56:00
db:PACKETSTORMid:131089date:2015-03-30T21:20:12
db:PACKETSTORMid:131856date:2015-05-11T21:26:02
db:PACKETSTORMid:125109date:2014-02-07T04:32:05
db:PACKETSTORMid:126754date:2014-05-22T01:44:32
db:PACKETSTORMid:126052date:2014-04-08T21:21:55
db:PACKETSTORMid:126404date:2014-05-01T02:11:10
db:PACKETSTORMid:139721date:2016-11-15T00:42:48
db:PACKETSTORMid:126143date:2014-04-14T22:28:32
db:NVDid:CVE-2014-0050date:2014-04-01T06:27:51.373