ID

VAR-201409-1156


CVE

CVE-2014-6271


TITLE

GNU Bash shell executes commands in exported functions in environment variables

Trust: 0.8

sources: CERT/CC: VU#252743

DESCRIPTION

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: bash security update Advisory ID: RHSA-2014:1293-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1293.html Issue date: 2014-09-24 CVE Names: CVE-2014-6271 ===================================================================== 1. Summary: Updated bash packages that fix one security issue are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh). A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-6271) For additional information on the CVE-2014-6271 flaw, refer to the Knowledgebase article at https://access.redhat.com/articles/1200223 Red Hat would like to thank Stephane Chazelas for reporting this issue. All bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1141597 - CVE-2014-6271 bash: specially-crafted environment variables can be used to inject shell commands 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: bash-3.2-33.el5.1.src.rpm i386: bash-3.2-33.el5.1.i386.rpm bash-debuginfo-3.2-33.el5.1.i386.rpm x86_64: bash-3.2-33.el5.1.x86_64.rpm bash-debuginfo-3.2-33.el5.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bash-3.2-33.el5.1.src.rpm i386: bash-3.2-33.el5.1.i386.rpm bash-debuginfo-3.2-33.el5.1.i386.rpm ia64: bash-3.2-33.el5.1.i386.rpm bash-3.2-33.el5.1.ia64.rpm bash-debuginfo-3.2-33.el5.1.i386.rpm bash-debuginfo-3.2-33.el5.1.ia64.rpm ppc: bash-3.2-33.el5.1.ppc.rpm bash-debuginfo-3.2-33.el5.1.ppc.rpm s390x: bash-3.2-33.el5.1.s390x.rpm bash-debuginfo-3.2-33.el5.1.s390x.rpm x86_64: bash-3.2-33.el5.1.x86_64.rpm bash-debuginfo-3.2-33.el5.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm i386: bash-4.1.2-15.el6_5.1.i686.rpm bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm i386: bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm bash-doc-4.1.2-15.el6_5.1.i686.rpm x86_64: bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm bash-doc-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm x86_64: bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm bash-doc-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm i386: bash-4.1.2-15.el6_5.1.i686.rpm bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm ppc64: bash-4.1.2-15.el6_5.1.ppc64.rpm bash-debuginfo-4.1.2-15.el6_5.1.ppc64.rpm s390x: bash-4.1.2-15.el6_5.1.s390x.rpm bash-debuginfo-4.1.2-15.el6_5.1.s390x.rpm x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm i386: bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm bash-doc-4.1.2-15.el6_5.1.i686.rpm ppc64: bash-debuginfo-4.1.2-15.el6_5.1.ppc64.rpm bash-doc-4.1.2-15.el6_5.1.ppc64.rpm s390x: bash-debuginfo-4.1.2-15.el6_5.1.s390x.rpm bash-doc-4.1.2-15.el6_5.1.s390x.rpm x86_64: bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm bash-doc-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm i386: bash-4.1.2-15.el6_5.1.i686.rpm bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: bash-4.1.2-15.el6_5.1.src.rpm i386: bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm bash-doc-4.1.2-15.el6_5.1.i686.rpm x86_64: bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm bash-doc-4.1.2-15.el6_5.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: bash-4.2.45-5.el7_0.2.src.rpm x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm bash-doc-4.2.45-5.el7_0.2.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: bash-4.2.45-5.el7_0.2.src.rpm x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm bash-doc-4.2.45-5.el7_0.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: bash-4.2.45-5.el7_0.2.src.rpm ppc64: bash-4.2.45-5.el7_0.2.ppc64.rpm bash-debuginfo-4.2.45-5.el7_0.2.ppc64.rpm s390x: bash-4.2.45-5.el7_0.2.s390x.rpm bash-debuginfo-4.2.45-5.el7_0.2.s390x.rpm x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: bash-debuginfo-4.2.45-5.el7_0.2.ppc64.rpm bash-doc-4.2.45-5.el7_0.2.ppc64.rpm s390x: bash-debuginfo-4.2.45-5.el7_0.2.s390x.rpm bash-doc-4.2.45-5.el7_0.2.s390x.rpm x86_64: bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm bash-doc-4.2.45-5.el7_0.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: bash-4.2.45-5.el7_0.2.src.rpm x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-6271.html https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/articles/1200223 8. These vulnerabilities ("Padding Oracle on Downgraded Legacy Encryption" or "POODLE", Heartbleed, and Shellshock) could be exploited remotely to create a Denial of Service (DoS), allow unauthorized access, or disclose information. ============================================================================ Ubuntu Security Notice USN-2362-1 September 24, 2014 bash vulnerability ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Bash allowed bypassing environment restrictions in certain environments. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: bash 4.3-7ubuntu1.1 Ubuntu 12.04 LTS: bash 4.2-2ubuntu2.2 Ubuntu 10.04 LTS: bash 4.1-2ubuntu3.1 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- CA20141001-01: Security Notice for Bash Shellshock Vulnerability Issued: October 01, 2014 Updated: October 03, 2014 CA Technologies is investigating multiple GNU Bash vulnerabilities, referred to as the "Shellshock" vulnerabilities, which were publicly disclosed on September 24-27, 2014. CVE identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and CVE-2014-6278 have been assigned to these vulnerabilities. The CA Technologies Enterprise Information Security team has led a global effort to identify and remediate systems and products discovered with these vulnerabilities. We continue to patch our systems as fixes become available, and we are providing fixes for affected CA Technologies products. CA Technologies continues to aggressively scan our environments (including servers, networks, external facing applications, and SaaS environments) to proactively monitor, identify, and remediate any vulnerability when necessary. Risk Rating High Platform AIX Android (not vulnerable, unless rooted) Apple iOS (not vulnerable unless jailbroken) Linux Mac OS X Solaris Windows (not vulnerable unless Cygwin or similar ported Linux tools with Bash shell are installed) Other UNIX/BSD based systems if Bash is installed Any other OS or JeOS that utilizes Bash Affected Products The following products have been identified as potentially vulnerable, and we have made fixes available for all of these products. CA API Management (Linux appliance only) CA Application Performance Management (TIM is the only affected APM component) CA Application Performance Management Cloud Monitor CA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM) CA Layer 7 products (API Gateway, Mobile Access Gateway, API Management Portal) CA User Activity Reporting Module (Enterprise Log Manager) Note: This security notice will be updated if other CA Technologies products are determined to be vulnerable. In most cases, the Bash vulnerabilities will need to be patched by OS vendors. Exceptions may include CA Technologies appliances, and software products that include Linux, UNIX or Mac OS X based operating systems (that include Bash). Affected Components CentOS Cygwin GNU Bash Red Hat Enterprise Linux SUSE Linux Non-Affected Products IMPORTANT NOTE: This listing includes only a small subset of the unaffected CA Technologies products. We're including unaffected products that customers have already inquired about. While the following CA Technologies products are not directly affected by the Bash vulnerabilities, the underlying operating systems that CA Technologies software is installed on may be vulnerable. We strongly encourage our customers to follow the recommendations provided by their vendors for all operating systems they utilize. All CA SaaS / On Demand products were either not vulnerable or have already been patched. CA AHS / PaymentMinder - AHS App is not vulnerable. The AHS app does not execute CGI scripts, or spawn or execute shell commands from within the app. AHS infrastructure already patched. CA Asset Portfolio Management CA AuthMinder (Arcot WebFort) CA AuthMinder for Business Users CA AuthMinder for Consumers CA AutoSys products - We use the bash shell that comes with the operating system and the customer is responsible for patching their OS. Additionally, the agents themselves do not distribute any scripts that use bash. CA Clarity On Demand CA CloudMinder - CloudMinder does not include the Bash Shell in BoM, or use it, but because we are deployed on RHEL, customers may be indirectly affected. Customers using RHEL should apply patches provided by Red Hat. CA Console Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI. CA ControlMinder CA DataMinder (formerly DLP) products – Software and appliance confirmed not vulnerable. Note: Linux Agents shipped, but no public SSH or Web apps are used in these agents. Customers should patch bash shell on any Linux server with DataMinder agents. DataMinder agents should continue to function normally. CA Digital Payments SaaS (previously patched) CA Directory CA eCommerce SaaS / On Demand (previously patched) CA Endevor Software Change Manager CA Federation (formerly SiteMinder Federation) CA GovernanceMinder CA IdentityMinder CA Infrastructure Management CA JCLCheck CA Job Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI. CA NetQoS GigaStor Observer Expert CA Network Flow Analysis CA Performance Management for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI. CA RiskMinder CA Service Desk Manager CA Service Operations Insight (SOI) CA SiteMinder CA SOLVE:Access CA Spectrum for Linux - Not vulnerable. Be sure to apply bash fixes from your underlying operating system vendor. CA Strong Authentication CA System Watchdog for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI. CA Top Secret CA Universal Job Management Agent for OpenVMS - Our OpenVMS products do not bundle bash, and they do not supply bash scripts; we use nothing but the native DCL CLI. CA Virtual Assurance for Infrastructure Managers (VAIM) Solution CA Technologies has issued the following fixes to address the vulnerabilities. CA API Management: Patches for Linux appliance are available through CA Support to customers of Gateway (applicable for all versions – 6.1.5, 6.2, 7.0, 7.1, 8.0, 8.1, 8.1.1, 8.1.02). CA Application Performance Management: KB article for APM TIM has been published. APM TIM is the only part of APM that was affected. Refer to TEC618037. CA Application Performance Management Cloud Monitor: New images are available for subscribers. Download the latest OPMS version 8.2.1.5. For assistance, contact CA Support. CA Customer Experience Manager (CEM) Transaction Impact Monitor (TIM): Very low risk. 9.6 is not affected. 9.5 Installation uses Bash. We do not use Bash at all for the CEM operating system that we have shipped in the past. This means that customers who patch the OS will not impact the ability of the CEM TIMsoft from operating. However prior to version 9.6, the TIM installation script does use the bash shell. See new KB article TEC618037 for additional information. CA Layer 7 (API Gateway, Mobile Access Gateway, API Management Portal): Fixes for all Bash vulnerabilities and a security bulletin are available on the Layer 7 Support website. CA User Activity Reporting Module (Enterprise Log Manager): All 12.5 and 12.6 GA versions are potentially affected. Patches provided on 2014-09-30. To get the patch, use the OS update functionality to get the latest R12.6 SP1 subscription update. Note that you can update R12.5 SPx with the R12.6 SP1 OS update. For assistance, contact CA Support. Workaround None To help mitigate the risk, we do strongly encourage all customers to follow patch management best practices, and in particular for operating systems affected by the Bash Shellshock vulnerabilities. References CVE-2014-6271 - Bash environment variable command injection CVE-2014-7169 - Bash environment variable incomplete fix for CVE-2014-6271 CVE-2014-7186 - Bash parser redir_stack memory corruption CVE-2014-7187 - Bash nested flow control constructs off-by-one CVE-2014-6277 - Bash untrusted pointer use uninitialized memory CVE-2014-6278 - Bash environment variable command injection CA20141001-01: Security Notice for Bash Shellshock Vulnerability https://support.ca.com/irj/portal/anonymous/phpsbpldgpg Change History v1.0: 2014-10-01, Initial Release v1.1: 2014-10-02, Added AuthMinder, Strong Authentication, VAIM, Clarity OD, All SaaS/OD products to list of Non-Affected Products. v1.2: 2014-10-03, Added RiskMinder to Non-Affected Products. Updated UARM solution info. If additional information is required, please contact CA Technologies Support at https://support.ca.com. If you discover a vulnerability in CA Technologies products, please report your findings to the CA Technologies Product Vulnerability Response Team at vuln@ca.com. PGP key: support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782 Security Notices https://support.ca.com/irj/portal/anonymous/phpsbpldgpg Regards, Ken Williams Director, Product Vulnerability Response Team CA Technologies | One CA Plaza | Islandia, NY 11749 | www.ca.com Ken.Williams@ca.com | vuln@ca.com Copyright © 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15238) Charset: utf-8 wsBVAwUBVDK+PZI1FvIeMomJAQFl/Af/TqrSE/h4r3gs9PwrWKdt21PCRI3za9Lx M5ZyTdVDIQ9ybgPkLqsovNRPgVqd7zwDHsx0rzvF5Y82uO+vQ63BuEV2GnczAax/ EiAW4WVxUgWG+lAowGV55Of8ruv/gOiAWTjFhkqpsyVg96ZMw2HLG62IwZL1j0qa oLCu0y3VrGvqH0g2hi75QwHAjNCdlEsD4onUqTCc9cRTdLwFCZrUQ8KTrqIL7LK5 Uo5T9C1UeAyNTo3KiJ/zw3BCOTkpl99dmg3NW0onU/1r1CXdlyS7opLB+GJ+xGwP xRQdUsOIhzfRzx7bsao2D43IhDnzJBBFJHdeMPo18WBTfJ7aUgBwGQ== =B62b -----END PGP SIGNATURE----- . No other firmware stream updates are planned beyond the NX-OS 5.x and 6.x versions listed below for the MDS products. HP has released and posted the Cisco switch software version NX-OS 6.2(9a) on HP Support Center (HPSC). This software versions 6.2(9a) has included the fixes for the vulnerability in HP StoreFabric C-series MDS switches which currently supporting NX-OS 6.X releases. HP has released and posted the Cisco switch software version NX-OS 5.2(8e) on HP Support Center (HPSC). This software version 5.2(8e) has included the fix for the vulnerability in HP C-series MDS switches which currently supporting NX-OS 5.X releases. All MDS and Nexus 5K switches can function in this configuration. Access is available through the console port. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/bash-4.2.048-i486-1_slack14.1.txz: Upgraded. In many common configurations (such as the use of CGI scripts), this vulnerability is exploitable over the network. Thanks to Stephane Chazelas for discovering this issue. For more information, see: http://seclists.org/oss-sec/2014/q3/650 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bash-3.1.018-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bash-3.1.018-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bash-4.1.012-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bash-4.1.012-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bash-4.1.012-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bash-4.1.012-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bash-4.2.048-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bash-4.2.048-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bash-4.2.048-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bash-4.2.048-x86_64-1_slack14.1.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/bash-4.3.025-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/bash-4.3.025-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 0f1b811376d3d2c5361f3454622a362e bash-3.1.018-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 9d727bed3e447a3b12055101982f7fc7 bash-3.1.018-x86_64-1_slack13.0.txz Slackware 13.1 package: f9da6c83129abec534a8e0425f0bbdde bash-4.1.012-i486-1_slack13.1.txz Slackware x86_64 13.1 package: f1bbea2829c3b800dc401ba911d47b61 bash-4.1.012-x86_64-1_slack13.1.txz Slackware 13.37 package: d8eb30ddaa6c5c227a9263702fd81eae bash-4.1.012-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 3854601f9152bc780730c48dd686ef27 bash-4.1.012-x86_64-1_slack13.37.txz Slackware 14.0 package: d01b294288a5f8ead15f0cf160bb38bd bash-4.2.048-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 324cc2cdedff1b8d6a355e013c42d5b1 bash-4.2.048-x86_64-1_slack14.0.txz Slackware 14.1 package: f7f18cd323b727fac2e6bbf9cab8213b bash-4.2.048-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 0dee161f7eede16fe5d9394bd231bfd7 bash-4.2.048-x86_64-1_slack14.1.txz Slackware -current package: d9bcc4828e311bc901b47f3460421f75 a/bash-4.3.025-i486-1.txz Slackware x86_64 -current package: c7bc5ec4b3e9ac3022ad6a718ae19d7b a/bash-4.3.025-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg bash-4.2.048-i486-1_slack14.1.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Open the PXE Configuration Utility on the HP Insight Control server deployment window Select Linux Managed from the Boot Menu options Click the Edit button. Clicking the Edit button displays the Edit Shared Menu Option window Uncheck the x86 option in Operating System and Processor Options and click OK. Release Date: 2014-11-11 Last Updated: 2014-11-11 Potential Security Impact: Remote code execution Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP StoreFabric H-series switches running Bash Shell. References: CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 SSRT101747 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. All HP StoreFabric H-series switches BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP is actively working on a firmware update to resolve the vulnerability in HP StoreFabric H-series switches. MITIGATION INFORMATION HP recommends the following steps to reduce the risk of this vulnerability: - Place the HP StoreFabric H-series switch and other data center critical infrastructure behind a firewall to disallow access from the Internet. - Change all HP StoreFabric switch default account passwords, including the root passwords, from the default factory passwords. - Examine the list of accounts, including ones on the switch and those existing on remote authentication servers such as RADIUS, LDAP, and TACAS+, to ensure only necessary personnel can gain access to HP StoreFabric H-series switches. Delete guest accounts and temporary accounts created for one-time usage needs. - To avoid possible exploit through the embedded web GUI, QuickTools, disable the web server with the following procedure: NOTE: After completing this procedure, the user will not be able to manage the switch using QuickTools. Login to the Command Line Interface (CLI). Execute the "admin start" command to enter into an admin session. Execute the "set setup services" command and change setting for EmbeddedGUIEnabled to "False". HISTORY Version:1 (rev.1) - 11 November 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. For the stable distribution (wheezy), this problem has been fixed in version 4.2+dfsg-0.1+deb7u1

Trust: 3.6

sources: NVD: CVE-2014-6271 // CERT/CC: VU#252743 // JVNDB: JVNDB-2014-004410 // BID: 70103 // VULMON: CVE-2014-6271 // PACKETSTORM: 128369 // PACKETSTORM: 130644 // PACKETSTORM: 128386 // PACKETSTORM: 128567 // PACKETSTORM: 129067 // PACKETSTORM: 129438 // PACKETSTORM: 128406 // PACKETSTORM: 130335 // PACKETSTORM: 129073 // PACKETSTORM: 128408

AFFECTED PRODUCTS

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 1.3

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 1.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 1.3

vendor:ibmmodel:storwize v7000scope:gteversion:1.5.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.13.9

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:1.1.0.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.5.1

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:10.1.129.11r1

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:software defined network for virtual environmentsscope:ltversion:1.2.1

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:3.8.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-iq devicescope:lteversion:4.4.0

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:gteversion:1.1.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.3_s390x

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:7.0_ppc64

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.4.1

Trust: 1.0

vendor:f5model:big-iq cloudscope:gteversion:4.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:8.2

Trust: 1.0

vendor:novellmodel:open enterprise serverscope:eqversion:2.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.0.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.1

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:2.1.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.9.12

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.3

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.3

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.8

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:3.1.1

Trust: 1.0

vendor:f5model:arxscope:lteversion:6.4.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.10.9

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:4.1.2.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:4.0.5

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:5.9

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:4.1.2.06

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:6.4_ppc64

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:lteversion:1.1.0.4

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:10.2.4

Trust: 1.0

vendor:checkpointmodel:security gatewayscope:ltversion:r77.30

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.6_ppc64

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:2.3.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.5.1

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:7.2.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.4_s390x

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:f5model:big-iq devicescope:gteversion:4.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:5.9_ppc

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.6

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.3

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:3.9.1.08

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.3.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.9.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.4.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:10.5.52.11r1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.5.1

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:10.2.4

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.10.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.3.2

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.2

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:3.4

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:7.3.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.5

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:10.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:5.9

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:3.8.0.07

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.5.1

Trust: 1.0

vendor:susemodel:studio onsitescope:eqversion:1.3

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:workload deployerscope:lteversion:3.1.0.7

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:10.1.0

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:4.1.2.0

Trust: 1.0

vendor:mageiamodel:mageiascope:eqversion:4.0

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.5

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:5.6

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.5

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.3.0.7

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:3.9.1.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.3.0.7

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.4_ppc64

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:4.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.5

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:6

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.4

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:3.8.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.9

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.1.0.11

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:3.9.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.2.0.9

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:5.0_ppc

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:10.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:6.0_ppc64

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.7

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.2

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.2.0.9

Trust: 1.0

vendor:f5model:big-iq securityscope:gteversion:4.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:f5model:big-iq securityscope:lteversion:4.4.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:4.1.2.06

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:3.8.0.0

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:2.3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:3.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.7

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.14.4f

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:1.1.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11

Trust: 1.0

vendor:ibmmodel:smartcloud provisioningscope:eqversion:2.1.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:1.1.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.0.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.14.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:11.4.1

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.13.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.3_ppc64

Trust: 1.0

vendor:ibmmodel:qradar risk managerscope:eqversion:7.1.0

Trust: 1.0

vendor:ibmmodel:starter kit for cloudscope:eqversion:2.2.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.1.0.11

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:3.9.1.08

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:4.1.2.06

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.1.0.11

Trust: 1.0

vendor:qnapmodel:qtsscope:eqversion:4.1.1

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.1

Trust: 1.0

vendor:gnumodel:bashscope:lteversion:4.3

Trust: 1.0

vendor:ibmmodel:workload deployerscope:gteversion:3.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.7

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.2

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:10.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.3.0.7

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.3.0

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:6.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:gteversion:10.5

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.6_s390x

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.1

Trust: 1.0

vendor:f5model:arxscope:gteversion:6.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:11.6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.5_ppc64

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:9.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.0.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.2

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:11.3.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.2.0.9

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:7.2.0.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:3.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.7_s390x

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:6.5_s390x

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:4.0.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.2

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:10.2.4

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:2.4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.5_s390x

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:3.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:lteversion:1.0.0.4

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.7_ppc64

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:9.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.5.1

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:6.4_s390x

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:7.3.0.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.11.11

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:5.9_s390x

Trust: 1.0

vendor:novellmodel:open enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:7.3.0.0

Trust: 1.0

vendor:mageiamodel:mageiascope:eqversion:3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:5.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:10.0.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.11.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:1.5.0.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.7

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.4

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.1.0.11

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:6.5_ppc64

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:gteversion:1.0.0.0

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.1.0.11

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-iq cloudscope:lteversion:4.4.0

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:4

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:9.3.67.5r1

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.7

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:10.3

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:3.8.0.07

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.8.15

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.8

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.6

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:3.9.1.08

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.1

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:11.0.0

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:gteversion:10

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.8

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.6

Trust: 1.0

vendor:qnapmodel:qtsscope:ltversion:4.1.1

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.12.9

Trust: 1.0

vendor:redhatmodel:gluster storage server for on-premisescope:eqversion:2.1

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.2

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:4.1.2.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.12.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.6

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:1.4.3.5

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:3.8.0.07

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.5

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.10.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:3.9.1.0

Trust: 1.0

vendor:gnumodel:bashscope:eqversion:3.2

Trust: 0.9

vendor:gnumodel:bashscope:eqversion:3.0

Trust: 0.9

vendor:gnumodel:bashscope:eqversion:3.0.16

Trust: 0.9

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:barracudamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:cygwinmodel: - scope: - version: -

Trust: 0.8

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:extrememodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:fireeyemodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:gnu bashmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mageiamodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:monroemodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:niksunmodel: - scope: - version: -

Trust: 0.8

vendor:netappmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:palo altomodel: - scope: - version: -

Trust: 0.8

vendor:qnap securitymodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sophosmodel: - scope: - version: -

Trust: 0.8

vendor:trend micromodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:xirrusmodel: - scope: - version: -

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:・ vmware product details: vmsa-2014-0010

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:4.3 to

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:・fujitsu product details: gnu bash to os fujitsu product response to "comm injection vulnerability"

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:hewlett-packard product details: hpsbgn03117 ssrt101724 other

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:oracle product details: bash "shellshock" vulnerabilities - cve-2014-7169

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:cisco systems product details: cisco-sa-20140926-

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:・details of hitachi products: server/client products vulnerability (cve-2014-6271,cve-2014-7169 other ) about the impact of other

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:・details of nippon electric products: av14-003

Trust: 0.8

vendor:gnumodel:bashscope:eqversion: -

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:・apple product details: ht6495 , ht6535

Trust: 0.8

vendor:gnumodel:bashscope:eqversion:1.14.7

Trust: 0.6

vendor:gnumodel:bashscope:eqversion:2.01.1

Trust: 0.6

vendor:gnumodel:bashscope:eqversion:2.01

Trust: 0.6

vendor:gnumodel:bashscope:eqversion:2.0

Trust: 0.6

vendor:gnumodel:bashscope:eqversion:2.05

Trust: 0.6

vendor:gnumodel:bashscope:eqversion:1.14.6

Trust: 0.6

vendor:gnumodel:bashscope:eqversion:1.14.5

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:5.0.307.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1004

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1033

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1044

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.1

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.391.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1012

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1039

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.00.0(2)

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7238

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.539.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.434.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1031

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.399.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.365.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.474.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.2

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.326.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.76

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.40

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:ciscomodel:secure access control serverscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.530.0

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.348.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1010

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.2

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.18

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.82

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.395.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.6

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:78000

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.13

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1051

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1061

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.385.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.319.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.443.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.296.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.374.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.1

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.417.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.21

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1043

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1049

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7242

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.7

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.407.0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9393

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1057

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.518.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.346.0

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:70000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.421.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.390.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.35

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.438.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.39

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:1.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.462.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.11

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7235

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:eqversion:7.01

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.368.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.87

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.126

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.481.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.489.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.393.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.362.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.423.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.323.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.93

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.370.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.380.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.0

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5(2)

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.512.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.419.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.66

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.361.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1018

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.58

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.22

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.483.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.467.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.435.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.278.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.413.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1017

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.537.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.379.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.513.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.1

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1062

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1020

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.469.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1042

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1058

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.158.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.49

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.334.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.506.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1054

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.414.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.494.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.484.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1030

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.85

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.328.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.482.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.479.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.381.0

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.394.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.364.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.521.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.520.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.349.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1022

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.528.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.7

Trust: 0.3

vendor:vmwaremodel:studioscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.3

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.2.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.1.4

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.476.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491064

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.61

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.345.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.325.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1026

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.33

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.431.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.347.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.498.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.412.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1038

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.406.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.515.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.409.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.329.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1006

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.68

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:40000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.315.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.32

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.277.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.384.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.69

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.170.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.29

Trust: 0.3

vendor:ciscomodel:gss 4492r global site selectorscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.10

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.2-41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.422.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.1

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.1-32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.299.0

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0.193.2

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:1000v0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.371.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.8

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.272.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.411.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.496.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.363.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.294.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.367.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1016

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1045

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.36

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.454.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.28

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7245

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.337.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.301.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.96

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1032

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.80

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.473.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.441.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1040

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.88

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:8.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.440.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.426.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.343.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.355.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.327.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.477.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1055

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.22

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.67

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.516.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.430.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.493.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.457.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.21

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.0-407

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.29

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.308.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.211.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.92

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1019

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491036

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.522.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.341.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.95

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.152.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.338.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.451.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1015

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.480.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.19

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.30

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.4

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.427.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1024

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:6500

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.276.0

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.544.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.1

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.8

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1041

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1021

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.336.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.305.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1034

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.38

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.1-340

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.98

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.2

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.320.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.12

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.224.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.33

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.339.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.424.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.39

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.2-33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1035

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.478.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.540.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.1

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:67000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.8

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.542.0

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.330.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1014

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.1

Trust: 0.3

vendor:vmwaremodel:studioscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1001

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.492.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.510.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.410.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1056

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.0-1470

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.45

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.405.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.292.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.153.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1029

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.4

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.7

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.378.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.62

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1037

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1060

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.300.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.509.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.387.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.97

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.290.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.386.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.425.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.485.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.486.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.48

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.372.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:vmwaremodel:studio betascope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.392.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.403.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.221.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.45

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.5

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1063

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.0

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.72

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.304.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1028

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.289.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.31

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.487.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.3

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1046

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.303.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491059

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.332.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.159.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.73

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.60

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.3-29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.340.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1013

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.436.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1023

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.373.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9302

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.353.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.89

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.0

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7228

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.491.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:redmodel:hat enterprise linux long life serverscope:eqversion:5.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.1

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.4-26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.470.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.461.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.446.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.321.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.357.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.459.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.541.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.81

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.333.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.313.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.475.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.524.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.351.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.471.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1027

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.396.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.428.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.309.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.32

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.460.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.344.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1008

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.156.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:ibmmodel:ds8000scope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1053

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.455.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.488.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.526.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.449.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.505.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.400.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.497.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.287.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.286.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:gnumodel:bash rc1scope:eqversion:4.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7232

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.444.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.3

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:50000

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.358.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.548.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.58

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.24

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1007

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1047

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.456.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1052

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.525.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.8

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1009

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.74

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.432.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.89

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:emcmodel:avamar sp1scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.324.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1048

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1050

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.433.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.52

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.182.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.504.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.316.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:ciscomodel:unified computing systemscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.90

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.3

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.464.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.271.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:30000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.359.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.383.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.376.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1025

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.33

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.295.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.3

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.538.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.519.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.318.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1011

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: CERT/CC: VU#252743 // BID: 70103 // JVNDB: JVNDB-2014-004410 // CNNVD: CNNVD-201409-938 // NVD: CVE-2014-6271

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-6271
value: CRITICAL

Trust: 1.0

NVD: CVE-2014-6271
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201409-938
value: CRITICAL

Trust: 0.6

VULMON: CVE-2014-6271
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-6271
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2014-6271
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2014-6271
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2014-6271 // JVNDB: JVNDB-2014-004410 // CNNVD: CNNVD-201409-938 // NVD: CVE-2014-6271

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2014-004410 // NVD: CVE-2014-6271

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 128369 // CNNVD: CNNVD-201409-938

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201409-938

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-6271

PATCH

title:Server/Client Products  bash Vulnerability (CVE-2014-6271,CVE-2014-7169 other ) About the impact of Fujitsu Fujitsu   Security informationurl:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html

Trust: 0.8

title:funcdef-import-4.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51626

Trust: 0.6

title:funcdef-import-3.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51622

Trust: 0.6

title:funcdef-import-4.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51625

Trust: 0.6

title:funcdef-import-2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51621

Trust: 0.6

title:funcdef-import-3.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51624

Trust: 0.6

title:funcdef-import-3.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51623

Trust: 0.6

title:funcdef-import-4.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51627

Trust: 0.6

title:Ubuntu Security Notice: bash vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2362-1

Trust: 0.1

title:Debian Security Advisories: DSA-3032-1 bash -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=50d43ccd8bbe4fa0648529a981b20a39

Trust: 0.1

title:Debian CVElist Bug Report Logs: bash: CVE-2014-7169: Incomplete fix for CVE-2014-6271url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=7a56c10ff83e62f236b0dc330aab6c31

Trust: 0.1

title:Debian Security Advisories: DSA-3035-1 bash -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=f4f02191845c862da8b42c8e3db24b63

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-418url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-418

Trust: 0.1

title:Red Hat: CVE-2014-6271url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-6271

Trust: 0.1

title:BSY-reporturl:https://github.com/sulsseo/BSY-report

Trust: 0.1

title:CGIShellurl:https://github.com/cj1324/CGIShell

Trust: 0.1

title:Safety-Project-Collectionurl:https://github.com/Bypass007/Safety-Project-Collection

Trust: 0.1

sources: VULMON: CVE-2014-6271 // JVNDB: JVNDB-2014-004410 // CNNVD: CNNVD-201409-938

EXTERNAL IDS

db:NVDid:CVE-2014-6271

Trust: 4.6

db:CERT/CCid:VU#252743

Trust: 3.2

db:JVNid:JVN55667175

Trust: 2.4

db:JVNDBid:JVNDB-2014-000126

Trust: 2.4

db:USCERTid:TA14-268A

Trust: 2.4

db:BIDid:70103

Trust: 1.9

db:PACKETSTORMid:128567

Trust: 1.7

db:SECUNIAid:60055

Trust: 1.6

db:SECUNIAid:61287

Trust: 1.6

db:SECUNIAid:60325

Trust: 1.6

db:SECUNIAid:61703

Trust: 1.6

db:SECUNIAid:61855

Trust: 1.6

db:SECUNIAid:62343

Trust: 1.6

db:SECUNIAid:61328

Trust: 1.6

db:SECUNIAid:60433

Trust: 1.6

db:SECUNIAid:58200

Trust: 1.6

db:SECUNIAid:59737

Trust: 1.6

db:SECUNIAid:61641

Trust: 1.6

db:SECUNIAid:61654

Trust: 1.6

db:SECUNIAid:61857

Trust: 1.6

db:SECUNIAid:61283

Trust: 1.6

db:SECUNIAid:61816

Trust: 1.6

db:SECUNIAid:61503

Trust: 1.6

db:SECUNIAid:61633

Trust: 1.6

db:SECUNIAid:60034

Trust: 1.6

db:SECUNIAid:60063

Trust: 1.6

db:SECUNIAid:60044

Trust: 1.6

db:SECUNIAid:61643

Trust: 1.6

db:SECUNIAid:59272

Trust: 1.6

db:SECUNIAid:61542

Trust: 1.6

db:SECUNIAid:61547

Trust: 1.6

db:SECUNIAid:61471

Trust: 1.6

db:SECUNIAid:61550

Trust: 1.6

db:SECUNIAid:61129

Trust: 1.6

db:SECUNIAid:61700

Trust: 1.6

db:SECUNIAid:60947

Trust: 1.6

db:SECUNIAid:61485

Trust: 1.6

db:SECUNIAid:61676

Trust: 1.6

db:SECUNIAid:61603

Trust: 1.6

db:SECUNIAid:61442

Trust: 1.6

db:SECUNIAid:61188

Trust: 1.6

db:SECUNIAid:61873

Trust: 1.6

db:SECUNIAid:61715

Trust: 1.6

db:SECUNIAid:61128

Trust: 1.6

db:SECUNIAid:62228

Trust: 1.6

db:SECUNIAid:61711

Trust: 1.6

db:SECUNIAid:60024

Trust: 1.6

db:SECUNIAid:60193

Trust: 1.6

db:SECUNIAid:61291

Trust: 1.6

db:SECUNIAid:62312

Trust: 1.6

db:SECUNIAid:61565

Trust: 1.6

db:SECUNIAid:61780

Trust: 1.6

db:SECUNIAid:61313

Trust: 1.6

db:SECUNIAid:61312

Trust: 1.6

db:SECUNIAid:61552

Trust: 1.6

db:SECUNIAid:61065

Trust: 1.6

db:SECUNIAid:59907

Trust: 1.6

db:EXPLOIT-DBid:40619

Trust: 1.6

db:EXPLOIT-DBid:39918

Trust: 1.6

db:EXPLOIT-DBid:37816

Trust: 1.6

db:EXPLOIT-DBid:40938

Trust: 1.6

db:EXPLOIT-DBid:38849

Trust: 1.6

db:EXPLOIT-DBid:42938

Trust: 1.6

db:EXPLOIT-DBid:34879

Trust: 1.6

db:JUNIPERid:JSA10673

Trust: 1.6

db:JUNIPERid:JSA10648

Trust: 1.6

db:PACKETSTORMid:128517

Trust: 1.6

db:PACKETSTORMid:137376

Trust: 1.6

db:PACKETSTORMid:128573

Trust: 1.6

db:PACKETSTORMid:161107

Trust: 1.6

db:MCAFEEid:SB10085

Trust: 1.6

db:JVNid:JVNVU97537282

Trust: 0.8

db:JVNid:JVNVU97219505

Trust: 0.8

db:ICS CERTid:ICSA-15-344-01

Trust: 0.8

db:ICS CERTid:ICSA-14-269-01A

Trust: 0.8

db:JVNDBid:JVNDB-2014-004410

Trust: 0.8

db:CNNVDid:CNNVD-201409-938

Trust: 0.6

db:VULMONid:CVE-2014-6271

Trust: 0.1

db:PACKETSTORMid:128369

Trust: 0.1

db:PACKETSTORMid:130644

Trust: 0.1

db:PACKETSTORMid:128386

Trust: 0.1

db:PACKETSTORMid:129067

Trust: 0.1

db:PACKETSTORMid:129438

Trust: 0.1

db:PACKETSTORMid:128406

Trust: 0.1

db:PACKETSTORMid:130335

Trust: 0.1

db:PACKETSTORMid:129073

Trust: 0.1

db:PACKETSTORMid:128408

Trust: 0.1

sources: CERT/CC: VU#252743 // VULMON: CVE-2014-6271 // BID: 70103 // JVNDB: JVNDB-2014-004410 // PACKETSTORM: 128369 // PACKETSTORM: 130644 // PACKETSTORM: 128386 // PACKETSTORM: 128567 // PACKETSTORM: 129067 // PACKETSTORM: 129438 // PACKETSTORM: 128406 // PACKETSTORM: 130335 // PACKETSTORM: 129073 // PACKETSTORM: 128408 // CNNVD: CNNVD-201409-938 // NVD: CVE-2014-6271

REFERENCES

url:https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

Trust: 3.2

url:https://access.redhat.com/articles/1200223

Trust: 2.5

url:http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html

Trust: 2.4

url:http://support.apple.com/kb/ht6495

Trust: 2.4

url:https://kb.bluecoat.com/index?page=content&id=sa82

Trust: 2.4

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash

Trust: 2.4

url:http://www.debian.org/security/2014/dsa-3032

Trust: 2.4

url:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html

Trust: 2.4

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10085

Trust: 2.4

url:http://support.novell.com/security/cve/cve-2014-6271.html

Trust: 2.4

url:http://jvndb.jvn.jp/jvndb/jvndb-2014-000126

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/252743

Trust: 2.4

url:http://www.us-cert.gov/ncas/alerts/ta14-268a

Trust: 2.4

url:http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html

Trust: 2.4

url:http://advisories.mageia.org/mgasa-2014-0388.html

Trust: 2.4

url:http://packetstormsecurity.com/files/161107/sonicwall-ssl-vpn-shellshock-remote-code-execution.html

Trust: 2.2

url:http://rhn.redhat.com/errata/rhsa-2014-1293.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2362-1

Trust: 1.7

url:http://packetstormsecurity.com/files/128517/vmware-security-advisory-2014-0010.html

Trust: 1.6

url:http://www.qnap.com/i/en/support/con_show.php?cid=61

Trust: 1.6

url:https://www.exploit-db.com/exploits/40938/

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383081521087&w=2

Trust: 1.6

url:http://secunia.com/advisories/61855

Trust: 1.6

url:http://secunia.com/advisories/61857

Trust: 1.6

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383465822787&w=2

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=1141597

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2014-1354.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685749

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141235957116749&w=2

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141216207813411&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141694386919794&w=2

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686447

Trust: 1.6

url:https://support.citrix.com/article/ctx200223

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686445

Trust: 1.6

url:http://www.securityfocus.com/bid/70103

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141319209015420&w=2

Trust: 1.6

url:http://packetstormsecurity.com/files/128573/apache-mod_cgi-remote-command-execution.html

Trust: 1.6

url:http://secunia.com/advisories/59272

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383026420882&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383244821813&w=2

Trust: 1.6

url:http://secunia.com/advisories/61503

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272

Trust: 1.6

url:https://www.exploit-db.com/exploits/37816/

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142719845423222&w=2

Trust: 1.6

url:http://secunia.com/advisories/61188

Trust: 1.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04497075

Trust: 1.6

url:https://support.citrix.com/article/ctx200217

Trust: 1.6

url:http://secunia.com/advisories/62312

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685914

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141576728022234&w=2

Trust: 1.6

url:http://secunia.com/advisories/61065

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141330425327438&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685604

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383138121313&w=2

Trust: 1.6

url:http://seclists.org/fulldisclosure/2014/oct/0

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686494

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686131

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142358078406056&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142721162228379&w=2

Trust: 1.6

url:http://secunia.com/advisories/61715

Trust: 1.6

url:http://secunia.com/advisories/61312

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141330468527613&w=2

Trust: 1.6

url:http://secunia.com/advisories/61313

Trust: 1.6

url:http://secunia.com/advisories/61676

Trust: 1.6

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383304022067&w=2

Trust: 1.6

url:http://secunia.com/advisories/61711

Trust: 1.6

url:http://secunia.com/advisories/61550

Trust: 1.6

url:http://secunia.com/advisories/60063

Trust: 1.6

url:http://secunia.com/advisories/61552

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html

Trust: 1.6

url:https://www.exploit-db.com/exploits/34879/

Trust: 1.6

url:http://secunia.com/advisories/61291

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141345648114150&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383353622268&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685733

Trust: 1.6

url:http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0

Trust: 1.6

url:https://www.exploit-db.com/exploits/38849/

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html

Trust: 1.6

url:http://www.vmware.com/security/advisories/vmsa-2014-0010.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687079

Trust: 1.6

url:http://secunia.com/advisories/58200

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141879528318582&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142805027510172&w=2

Trust: 1.6

url:http://secunia.com/advisories/61328

Trust: 1.6

url:http://secunia.com/advisories/61603

Trust: 1.6

url:http://secunia.com/advisories/61565

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141383196021590&w=2

Trust: 1.6

url:http://secunia.com/advisories/61287

Trust: 1.6

url:http://secunia.com/advisories/61442

Trust: 1.6

url:http://secunia.com/advisories/60193

Trust: 1.6

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673&src=securityalerts

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142118135300698&w=2

Trust: 1.6

url:http://secunia.com/advisories/61283

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2014-1294.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686479

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html

Trust: 1.6

url:http://linux.oracle.com/errata/elsa-2014-1293.html

Trust: 1.6

url:http://secunia.com/advisories/61816

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685541

Trust: 1.6

url:https://access.redhat.com/node/1200223

Trust: 1.6

url:https://www.exploit-db.com/exploits/40619/

Trust: 1.6

url:http://secunia.com/advisories/60325

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141577137423233&w=2

Trust: 1.6

url:http://secunia.com/advisories/61654

Trust: 1.6

url:http://www.novell.com/support/kb/doc.php?id=7015701

Trust: 1.6

url:http://secunia.com/advisories/59737

Trust: 1.6

url:http://secunia.com/advisories/62228

Trust: 1.6

url:http://secunia.com/advisories/62343

Trust: 1.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04518183

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142113462216480&w=2

Trust: 1.6

url:http://secunia.com/advisories/60044

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142546741516006&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686246

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2014-1295.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html

Trust: 1.6

url:http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141585637922673&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686084

Trust: 1.6

url:http://secunia.com/advisories/61547

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10673

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141577241923505&w=2

Trust: 1.6

url:http://secunia.com/advisories/61703

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:164

Trust: 1.6

url:http://secunia.com/advisories/61700

Trust: 1.6

url:https://support.apple.com/kb/ht6535

Trust: 1.6

url:http://linux.oracle.com/errata/elsa-2014-1294.html

Trust: 1.6

url:http://secunia.com/advisories/59907

Trust: 1.6

url:http://secunia.com/advisories/61542

Trust: 1.6

url:http://secunia.com/advisories/60055

Trust: 1.6

url:http://packetstormsecurity.com/files/137376/ipfire-bash-environment-variable-injection-shellshock.html

Trust: 1.6

url:http://secunia.com/advisories/61780

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html

Trust: 1.6

url:https://www.suse.com/support/shellshock/

Trust: 1.6

url:http://www.securityfocus.com/archive/1/533593/100/0/threaded

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=142358026505815&w=2

Trust: 1.6

url:http://secunia.com/advisories/60947

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141577297623641&w=2

Trust: 1.6

url:http://www.novell.com/support/kb/doc.php?id=7015721

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html

Trust: 1.6

url:http://secunia.com/advisories/61873

Trust: 1.6

url:http://secunia.com/advisories/61633

Trust: 1.6

url:http://secunia.com/advisories/60024

Trust: 1.6

url:http://secunia.com/advisories/61471

Trust: 1.6

url:https://www.exploit-db.com/exploits/42938/

Trust: 1.6

url:http://jvn.jp/en/jp/jvn55667175/index.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141450491804793&w=2

Trust: 1.6

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.6

url:http://secunia.com/advisories/61129

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141216668515282&w=2

Trust: 1.6

url:http://secunia.com/advisories/60433

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html

Trust: 1.6

url:http://secunia.com/advisories/61643

Trust: 1.6

url:http://secunia.com/advisories/61128

Trust: 1.6

url:https://www.exploit-db.com/exploits/39918/

Trust: 1.6

url:http://secunia.com/advisories/61485

Trust: 1.6

url:http://secunia.com/advisories/61641

Trust: 1.6

url:http://secunia.com/advisories/60034

Trust: 1.6

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10648

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-6271

Trust: 1.0

url:http://seclists.org/oss-sec/2014/q3/650

Trust: 0.9

url:http://seclists.org/oss-sec/2014/q3/688

Trust: 0.8

url:http://seclists.org/oss-sec/2014/q3/685

Trust: 0.8

url:http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html

Trust: 0.8

url:https://gist.github.com/anonymous/929d622f3b36b00c0be1

Trust: 0.8

url:https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html

Trust: 0.8

url:https://shellshocker.net/#

Trust: 0.8

url:https://www.barracuda.com/support/techalerts

Trust: 0.8

url:http://www.checkpoint.com/blog/protecting-shellshock/index.html

Trust: 0.8

url:http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044

Trust: 0.8

url:http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf

Trust: 0.8

url:http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/

Trust: 0.8

url:http://www.fortiguard.com/advisory/fg-ir-14-030/

Trust: 0.8

url:http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml

Trust: 0.8

url:http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0

Trust: 0.8

url:http://kb.juniper.net/jsa10648

Trust: 0.8

url:http://jpn.nec.com/security-info/av14-003.html

Trust: 0.8

url:https://www.suse.com/support/kb/doc.php?id=7015702

Trust: 0.8

url:http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193

Trust: 0.8

url:http://www.ubuntu.com/usn/usn-2362-1/

Trust: 0.8

url:http://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2090740

Trust: 0.8

url:http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97219505/index.html

Trust: 0.8

url:http://jvn.jp/jp/jvn55667175/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97537282/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6271

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2014/at140037.html

Trust: 0.8

url:https://cisa.gov/known-exploited-vulnerabilities-catalog

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-15-344-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a

Trust: 0.8

url:http://www.aratana.jp/security/detail.php?id=10

Trust: 0.8

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.5

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.5

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-7186

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-7169

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-6277

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-7187

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-6278

Trust: 0.5

url:http://www.gnu.org/software/bash/

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-6271.html

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:http://h20564.www2.hp.com/hpsc/swd/public/readindex?sp4ts.oid=5263732&swlango

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0224

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

url:http://h20564.www2.hp.com/hpsc/swd/public/readindex?sp4ts.oid=5331223&swlango

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.1

Trust: 0.1

url:https://www.ca.com

Trust: 0.1

url:https://support.ca.com/irj/portal/anonymous/phpsbpldgpg

Trust: 0.1

url:https://support.ca.com.

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2104-6277

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2104-6278

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6271

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

sources: CERT/CC: VU#252743 // BID: 70103 // JVNDB: JVNDB-2014-004410 // PACKETSTORM: 128369 // PACKETSTORM: 130644 // PACKETSTORM: 128386 // PACKETSTORM: 128567 // PACKETSTORM: 129067 // PACKETSTORM: 129438 // PACKETSTORM: 128406 // PACKETSTORM: 130335 // PACKETSTORM: 129073 // PACKETSTORM: 128408 // CNNVD: CNNVD-201409-938 // NVD: CVE-2014-6271

CREDITS

Darren Martyn

Trust: 0.6

sources: CNNVD: CNNVD-201409-938

SOURCES

db:CERT/CCid:VU#252743
db:VULMONid:CVE-2014-6271
db:BIDid:70103
db:JVNDBid:JVNDB-2014-004410
db:PACKETSTORMid:128369
db:PACKETSTORMid:130644
db:PACKETSTORMid:128386
db:PACKETSTORMid:128567
db:PACKETSTORMid:129067
db:PACKETSTORMid:129438
db:PACKETSTORMid:128406
db:PACKETSTORMid:130335
db:PACKETSTORMid:129073
db:PACKETSTORMid:128408
db:CNNVDid:CNNVD-201409-938
db:NVDid:CVE-2014-6271

LAST UPDATE DATE

2024-11-13T21:56:58.842000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#252743date:2015-04-14T00:00:00
db:VULMONid:CVE-2014-6271date:2021-11-17T00:00:00
db:BIDid:70103date:2016-07-06T14:58:00
db:JVNDBid:JVNDB-2014-004410date:2024-07-17T06:21:00
db:CNNVDid:CNNVD-201409-938date:2021-11-08T00:00:00
db:NVDid:CVE-2014-6271date:2024-07-24T16:47:47.667

SOURCES RELEASE DATE

db:CERT/CCid:VU#252743date:2014-09-25T00:00:00
db:VULMONid:CVE-2014-6271date:2014-09-24T00:00:00
db:BIDid:70103date:2014-09-24T00:00:00
db:JVNDBid:JVNDB-2014-004410date:2014-09-29T00:00:00
db:PACKETSTORMid:128369date:2014-09-24T16:02:18
db:PACKETSTORMid:130644date:2015-03-05T14:44:00
db:PACKETSTORMid:128386date:2014-09-25T00:05:09
db:PACKETSTORMid:128567date:2014-10-06T16:47:01
db:PACKETSTORMid:129067date:2014-11-12T18:13:32
db:PACKETSTORMid:129438date:2014-12-09T23:15:30
db:PACKETSTORMid:128406date:2014-09-25T15:14:53
db:PACKETSTORMid:130335date:2015-02-10T17:43:19
db:PACKETSTORMid:129073date:2014-11-12T18:14:19
db:PACKETSTORMid:128408date:2014-09-25T15:16:08
db:CNNVDid:CNNVD-201409-938date:2014-09-25T00:00:00
db:NVDid:CVE-2014-6271date:2014-09-24T18:48:04.477