ID

VAR-201409-1156


CVE

CVE-2014-6271


TITLE

GNU Bash shell executes commands in exported functions in environment variables

Trust: 0.8

sources: CERT/CC: VU#252743

DESCRIPTION

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04467807 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04467807 Version: 2 HPSBGN03117 rev.2 - HP Remote Device Access: Virtual Customer Access System (vCAS) running Bash Shell, Remote Code Execution NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2014-09-30 Last Updated: 2014-11-11 Potential Security Impact: Remote code execution Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP Remote Device Access: Virtual Customer Access System (vCAS) running Bash Shell. NOTE: The vCAS product is vulnerable only if DHCP is enabled. References: CVE-2014-6271 CVE-2014-7169 SSRT101724 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. All vCAS versions prior to 14.10-38402 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following updates available to resolve the vulnerability in HP Remote Device Access: Virtual Customer Access System (vCAS) running Bash Shell. Customers should upgrade their vCAS systems using the web UI or the "casupdate" command. There are also new VirtualBox and VMware ESX images available: - VMware ESX/ESXi image: https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402.ova - VirtualBox image: https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402-vbox.ova NOTE: - HP recommends to not power-down or disconnect the vCAS until the update is available. - The vCAS pulls down the latest updates from HP by using Ubuntus apt-get facility. - HP does not push updates out on to the vCAS so customers will have to be proactive and install the latest updates. Actions Required The DHCP exploit can be mitigated by ensuring that DHCP is disabled on the vCAS as detailed in MITIGATION INFORMATION below. Download updates by using a web browser: 1. Connect to the vCAS and login as hp-admin 2. Go to Tools -> Software Updates 3. Under "Manual Actions" select Check now and then upgrade now See HP Remote Device Access vCAS User Guide, Chapter 4, Software Updates for more details: http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/action.pro cess/public/psi/manualsDisplay/?sp4ts.oid=4256914&javax.portlet.action=true&s pf_p.tpst=psiContentDisplay&javax.portlet.begCacheTok=com.vignette.cachetoken &spf_p.prp_psiContentDisplay=wsrp-interactionState%3DdocId%253Demr_na-c033816 86%257CdocLocale%253Den_US&javax.portlet.endCacheTok=com.vignette.cachetoken MITIGATION INFORMATION A Shellshock attack requires the definition of an environment variable introduced into Bash. The vCAS has three attack vectors: SSH, the lighttpd web server, and the DHCP client. - The exploit does not elevate privileges. The DHCP client uses Bash scripts and is vulnerable to Shellshock. The DHCP exploit can be mitigated by ensuring that DHCP is disabled on the vCAS. Note: HP strongly discourages the use of DHCP on the vCAS. The web UI forces the vCAS user to assign a static IP address and change the hp-admin password. A vCAS user must manually configure DHCP for use on the vCAS. A vCAS user can verify that DHCP is disabled by inspecting the file "/etc/network/interfaces" and ensuring that the "iface" line for device "eth0" is set for a static IP. Example of a static IP configuration: # The primary network interface auto eth0 iface eth0 inet static address 172.27.1.68 netmask 255.255.255.0 gateway 172.27.1.1 HISTORY Version:1 (rev.1) - 30 September 2014 Initial release Version:2 (rev.2) - 11 November 2014 Software updates available Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) iEYEARECAAYFAlRiTVMACgkQ4B86/C0qfVkVXwCgnt3AiI6i2W/bYpzl1OdUS3V0 240AnAzsgVtgeyaCKxbE7+fRS74qViiq =Gpae -----END PGP SIGNATURE----- . HP Product Firmware Version HP StoreEver ESL G3 Tape Libraries with MCB version 2 680H_GS40701 HP StoreEver ESL G3 Tape Libraries with MCB version 1 656H_GS10801 The firmware is customer installable and is available in the Drivers, Software & Firmware section at the following location: http://www.hp.com/support/eslg3 Notes: - Updating the library firmware requires a reboot of the library. - If the library firmware cannot be updated, HP recommends following the Mitigation Instructions below. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: rhev-hypervisor6 security update Advisory ID: RHSA-2014:1354-01 Product: Red Hat Enterprise Virtualization Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1354.html Issue date: 2014-10-02 CVE Names: CVE-2014-1568 CVE-2014-6271 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 ===================================================================== 1. Summary: An updated rhev-hypervisor6 package that fixes several security issues is now available. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEV-M 3.4 - noarch 3. Description: The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-6271) It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169) A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS. (CVE-2014-1568) It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code. (CVE-2014-7186) An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. (CVE-2014-7187) Red Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271, and the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges Antoine Delignat-Lavaud and Intel Product Security Incident Response Team as the original reporters of CVE-2014-1568. Users of the Red Hat Enterprise Virtualization Hypervisor are advised to upgrade to this updated package. 4. Solution: This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 To upgrade Hypervisors in Red Hat Enterprise Virtualization environments using the disk image provided by this package, refer to: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/ht ml/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Ente rprise_Virtualization_Hypervisors.html 5. Bugs fixed (https://bugzilla.redhat.com/): 1141597 - CVE-2014-6271 bash: specially-crafted environment variables can be used to inject shell commands 1145429 - CVE-2014-1568 nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73) 1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) 1146791 - CVE-2014-7186 bash: parser can allow out-of-bounds memory access while handling redir_stack 1146804 - CVE-2014-7187 bash: off-by-one error in deeply nested flow control constructs 6. Package List: RHEV-M 3.4: Source: rhev-hypervisor6-6.5-20140930.1.el6ev.src.rpm noarch: rhev-hypervisor6-6.5-20140930.1.el6ev.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-1568.html https://www.redhat.com/security/data/cve/CVE-2014-6271.html https://www.redhat.com/security/data/cve/CVE-2014-7169.html https://www.redhat.com/security/data/cve/CVE-2014-7186.html https://www.redhat.com/security/data/cve/CVE-2014-7187.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. No other firmware stream updates are planned beyond the NX-OS 5.x and 6.x versions listed below for the MDS products. HP has released and posted the Cisco switch software version NX-OS 6.2(9a) on HP Support Center (HPSC). This software versions 6.2(9a) has included the fixes for the vulnerability in HP StoreFabric C-series MDS switches which currently supporting NX-OS 6.X releases. HP has released and posted the Cisco switch software version NX-OS 5.2(8e) on HP Support Center (HPSC). This software version 5.2(8e) has included the fix for the vulnerability in HP C-series MDS switches which currently supporting NX-OS 5.X releases. HP is continuing to actively work on software updates to resolve the vulnerability in HP C-series Nexus 5k switches. This bulletin will be revised when these updates become available. MITIGATION INFORMATION If updating to a NX-OS version containing the fix is not currently possible, HP recommends the following steps to reduce the risk of this vulnerability: The "ssh" or "telnet" features may be disabled by the admin user. All MDS and Nexus 5K switches can function in this configuration. Access is available through the console port. Vantage Point Security Advisory 2015-001 ======================================== Title: Cisco Unified Communications Manager Multiple Vulnerabilities Vendor: Cisco Vendor URL: http://www.cisco.com/ Versions affected: <9.2, <10.5.2, <11.0.1. Severity: Low to medium Vendor notified: Yes Reported: Oct. 2014 Public release: Aug. 13th, 2015 Author: Bernhard Mueller <bernhard[at]vantagepoint[dot]sg> Summary: -------- Cisco Unified Communications Manager (CUCM) offers services such as session management, voice, video, messaging, mobility, and web conferencing. During the last year, Vantage Point Security has reported four security issues to Cisco as listed below. Shellshock command injection -------------------------------- Authenticated users of CUCM can access limited functionality via the web interface and Cisco console (SSH on port 22). shellshock). This allows an attacker to spawn a shell running as the user "admin". Example: $ LC_PAPER="() { x;};/bin/sh" ssh Administrator@examplecucm.com 2. Local File Inclusion ----------------------- The application allows users to view the contents of any locally accessible files on the web server through a vulnerability known as LFI (Local File Inclusion). LFI vulnerabilities are commonly used to download application source code, configuration files and files containing sensitive information such as passwords. Exploiting this issue requires a valid user account. https://cucm.example.com/:8443/reporter-servlet/GetFileContent?Location=/&FileName=/usr/local/thirdparty/jakarta-tomcat/conf/tomcat-users.xml 3. Unauthenticated access to ping command ----------------------------------------- The pingExecute servlet allows unauthenticated users to execute pings to arbitrary IP addresses. This could be used by an attacker to enumerate the internal network. The following URL triggers a ping of the host 10.0.0.1: https://cucm.example.com:8443/cmplatform/pingExecute?hostname=10.0.0.1&interval=1.0&packetsize=12&count=1000&secure=false 4. Magic session ID allows unauthenticated access to SOAP calls --------------------------------------------------------------- Authentication for some methods in the EPAS SOAP interface can be bypassed by using a hardcoded session ID. The methods "GetUserLoginInfoHandler" and "GetLoggedinXMPPUserHandler" are affected. Fix Information: ---------------- Upgrade to CUCM version 9.2, 10.5.2 or 11.0.1. References: ----------- https://tools.cisco.com/quickview/bug/CSCus88031 https://tools.cisco.com/quickview/bug/CSCur49414 https://tools.cisco.com/quickview/bug/CSCum05290 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash http://tools.cisco.com/security/center/viewAlert.x?alertId=37111 Timeline: --------- 2014/10: Issues reported to Cisco; 2015/07: Confirm that all issues have been fixed. About Vantage Point Security: -------------------- Vantage Point is the leading provider for penetration testing and security advisory services in Singapore. Clients in the Financial, Banking and Telecommunications industries select Vantage Point Security based on technical competency and a proven track record to deliver significant and measurable improvements in their security posture. https://www.vantagepoint.sg/ office[at]vantagepoint[dot]sg . The shell is not accessible via the standard calibration or remote management interfaces. The unit provides Calibration Software running on embedded Linux, which includes a Bash Shell

Trust: 2.7

sources: NVD: CVE-2014-6271 // CERT/CC: VU#252743 // BID: 70103 // VULMON: CVE-2014-6271 // PACKETSTORM: 129074 // PACKETSTORM: 129069 // PACKETSTORM: 128537 // PACKETSTORM: 128752 // PACKETSTORM: 129438 // PACKETSTORM: 133070 // PACKETSTORM: 128545 // PACKETSTORM: 128513

AFFECTED PRODUCTS

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 1.3

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 1.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 1.3

vendor:novellmodel:zenworks configuration managementscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.6.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.11.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.1.0.11

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.0.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.1

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:2.3.0

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:4.1.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:5.9_s390x

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.5.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:6.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.2

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:lteversion:1.1.0.4

Trust: 1.0

vendor:novellmodel:open enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:checkpointmodel:security gatewayscope:ltversion:r77.30

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.3

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:5.9_ppc

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:gteversion:1.1.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:6.4_s390x

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.10.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.12.9

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:4.1.2.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:2.1.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.9.12

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:3.8.0.07

Trust: 1.0

vendor:susemodel:studio onsitescope:eqversion:1.3

Trust: 1.0

vendor:ibmmodel:qradar risk managerscope:eqversion:7.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.0.0

Trust: 1.0

vendor:ibmmodel:software defined network for virtual environmentsscope:ltversion:1.2.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:1.1.0.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:9.3.67.5r1

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.3_s390x

Trust: 1.0

vendor:qnapmodel:qtsscope:eqversion:4.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.3

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.9

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.6.0

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.14.4f

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.3.0.7

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-iq securityscope:gteversion:4.0.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.9.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.5_ppc64

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:4.1.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:5.9

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.6

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.2.0.9

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.5

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0.0.0

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.1

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:3.9.1.08

Trust: 1.0

vendor:f5model:big-iq devicescope:gteversion:4.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.7_s390x

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:3.1.1

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.1

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:10.3

Trust: 1.0

vendor:ibmmodel:workload deployerscope:gteversion:3.1.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:3.9.1.08

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.8.15

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:10.0.0

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:3.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.6_s390x

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:starter kit for cloudscope:eqversion:2.2.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.4_s390x

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.5.1

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:7.3.0.0

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.5

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:5.9

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.6_ppc64

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.4

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:3.9.1.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.10.9

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:11.4.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.4_ppc64

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:11.0.0

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:6

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:3.2.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.7_ppc64

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:10.0.0

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.2

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.3.0

Trust: 1.0

vendor:ibmmodel:smartcloud provisioningscope:eqversion:2.1.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.10.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.4

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:3.0.0

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.5.1

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:10.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:10.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:6.4_ppc64

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:1.1.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.6

Trust: 1.0

vendor:f5model:arxscope:gteversion:6.0.0

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.7

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:gteversion:1.0.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:6.5_ppc64

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.0.0

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:6.5_s390x

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:9.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:4.0.5

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.8

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.3.0.7

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:3.9.1.08

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:gteversion:10

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.3

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:10.2.4

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.5.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:3.1.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.6

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.4.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.2.0.9

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:10.1.129.11r1

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.2

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.3.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2

Trust: 1.0

vendor:mageiamodel:mageiascope:eqversion:3.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.3

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:3.8.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:6.0_ppc64

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:novellmodel:open enterprise serverscope:eqversion:2.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:4.0.0

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.5

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.3.0.7

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.1

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:3.8.0.0

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:3.9.1.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:10.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:5.6

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.2.0.9

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.3.0

Trust: 1.0

vendor:ibmmodel:workload deployerscope:lteversion:3.1.0.7

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:7.2.0.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:10.5.52.11r1

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.7

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.6

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.13.9

Trust: 1.0

vendor:mageiamodel:mageiascope:eqversion:4.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.1.0.11

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.12.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:11.0.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.4

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:1.4.3.5

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:f5model:big-iq cloudscope:gteversion:4.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.1.0.11

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-iq securityscope:lteversion:4.4.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:arxscope:lteversion:6.4.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.2

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:gluster storage server for on-premisescope:eqversion:2.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.7

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:1.1.0.0

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.3.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.7

Trust: 1.0

vendor:qnapmodel:qtsscope:ltversion:4.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:6.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:3.8.0.0

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.8

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:4.1.2.06

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.5

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:9.1

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.8

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:1.5.0.4

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:3.9.1.0

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:4.1.2.06

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:10.2.4

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:gteversion:10.5

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:8.2

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.11.11

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.7

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.2

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:lteversion:1.0.0.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:gnumodel:bashscope:lteversion:4.3

Trust: 1.0

vendor:f5model:big-iq devicescope:lteversion:4.4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.4.1

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.5_s390x

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:3.8.0.07

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.1

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:4.1.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:2.4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.3_ppc64

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.1.0.11

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.3.2

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.5

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:3.8.0.07

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.14.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.1.0.11

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.2

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:4

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.1

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.2

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:7.2.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-iq cloudscope:lteversion:4.4.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:1.5.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:7.0_ppc64

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:5.0_ppc

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:10.1.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.13.0

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:4.1.2.06

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:2.3.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:barracudamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:cygwinmodel: - scope: - version: -

Trust: 0.8

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:extrememodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:fireeyemodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:gnu bashmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mageiamodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:monroemodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:niksunmodel: - scope: - version: -

Trust: 0.8

vendor:netappmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:palo altomodel: - scope: - version: -

Trust: 0.8

vendor:qnap securitymodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sophosmodel: - scope: - version: -

Trust: 0.8

vendor:trend micromodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:xirrusmodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:5.0.307.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1004

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1033

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1044

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.1

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.391.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1012

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1039

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.00.0(2)

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7238

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.539.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.434.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1031

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.399.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.365.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.474.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.2

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.326.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.76

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.40

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:ciscomodel:secure access control serverscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.530.0

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.348.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1010

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.2

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.18

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.82

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.395.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.6

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:78000

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.13

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1051

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1061

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.385.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.319.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.443.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.296.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.374.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.1

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.417.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.21

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1043

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1049

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7242

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.7

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.407.0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9393

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1057

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.518.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.346.0

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:70000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.421.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.390.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.35

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.438.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.39

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:1.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.462.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.11

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7235

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:eqversion:7.01

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.368.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.87

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.126

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.481.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.489.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.393.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.362.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.423.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.323.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.93

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.370.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.380.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.0

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5(2)

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.512.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.419.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.66

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.361.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1018

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.58

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.22

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.483.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.467.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.435.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.278.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.413.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1017

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.537.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.379.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.513.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.1

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.0

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1062

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1020

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.469.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1042

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1058

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.158.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.49

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.334.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.506.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1054

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.414.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.494.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.484.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1030

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.85

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.328.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.482.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.479.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.381.0

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.394.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.364.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.521.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.520.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.349.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1022

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.528.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.7

Trust: 0.3

vendor:vmwaremodel:studioscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.3

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.2.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.1.4

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.476.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491064

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.61

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.345.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.325.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1026

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.33

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.431.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.347.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.498.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.412.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1038

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.406.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.515.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.409.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.329.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1006

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.68

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:40000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.315.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.32

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.277.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.384.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.69

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.170.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.29

Trust: 0.3

vendor:ciscomodel:gss 4492r global site selectorscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.10

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.2-41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.422.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.1

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.1-32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.299.0

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0.193.2

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:1000v0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.371.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.8

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.272.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.411.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.496.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.363.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.294.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.367.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1016

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1045

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.36

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.454.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.28

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7245

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.337.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.301.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.96

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1032

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.80

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.473.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.441.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1040

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.88

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:8.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.440.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.426.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.343.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.355.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.327.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.477.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1055

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.22

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.67

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.516.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.430.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.493.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.457.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.21

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.0-407

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.29

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.308.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.211.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.92

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1019

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491036

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.522.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.341.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.95

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.152.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.338.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.451.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1015

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.480.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.19

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.30

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.4

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.427.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1024

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:6500

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.276.0

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.544.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.1

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.8

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1041

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1021

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.336.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.305.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1034

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.38

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.1-340

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.98

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.2

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.320.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.12

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.224.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.33

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.339.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.424.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.39

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.2-33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1035

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.478.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.540.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.1

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:67000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.8

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.542.0

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.330.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1014

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.1

Trust: 0.3

vendor:vmwaremodel:studioscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1001

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.492.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.510.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.410.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1056

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.0-1470

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.45

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.405.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.292.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.153.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1029

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.4

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.7

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.378.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.62

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1037

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1060

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.300.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.509.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.387.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.97

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.290.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.386.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.425.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.485.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.486.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.48

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.372.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:vmwaremodel:studio betascope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.1

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.0.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.392.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.403.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.221.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.45

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.5

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1063

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.0

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.72

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.304.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1028

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.289.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.31

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.487.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.3

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1046

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.303.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491059

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.332.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.159.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.73

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.60

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.3-29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.340.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1013

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.436.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1023

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.373.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9302

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.353.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.89

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.0

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7228

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.491.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:redmodel:hat enterprise linux long life serverscope:eqversion:5.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.1

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.4-26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.470.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.461.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.446.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.321.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.357.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.459.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.541.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.81

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.333.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.313.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.475.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.524.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.351.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.471.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1027

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.396.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.428.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.309.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.32

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.460.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.344.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1008

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.156.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:ibmmodel:ds8000scope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1053

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.455.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.488.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.526.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.449.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.505.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.400.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.497.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.287.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.286.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:gnumodel:bash rc1scope:eqversion:4.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7232

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.444.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.3

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:50000

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.358.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.548.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.58

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.24

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1007

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1047

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.456.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1052

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.525.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.8

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1009

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.74

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.432.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.89

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:emcmodel:avamar sp1scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.324.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1048

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1050

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.433.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.52

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.182.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.504.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.316.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:ciscomodel:unified computing systemscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.90

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.3

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.464.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.271.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:30000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.359.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.383.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.376.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1025

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.33

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.295.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.3

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.538.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.519.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.318.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1011

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: CERT/CC: VU#252743 // BID: 70103 // NVD: CVE-2014-6271

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-6271
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2014-6271
value: CRITICAL

Trust: 1.0

VULMON: CVE-2014-6271
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-6271
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2014-6271
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: VULMON: CVE-2014-6271 // NVD: CVE-2014-6271 // NVD: CVE-2014-6271

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

sources: NVD: CVE-2014-6271

THREAT TYPE

network

Trust: 0.3

sources: BID: 70103

TYPE

Design Error

Trust: 0.3

sources: BID: 70103

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-6271

PATCH

title:Ubuntu Security Notice: bash vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2362-1

Trust: 0.1

title:Debian Security Advisories: DSA-3032-1 bash -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=50d43ccd8bbe4fa0648529a981b20a39

Trust: 0.1

title:Debian CVElist Bug Report Logs: bash: CVE-2014-7169: Incomplete fix for CVE-2014-6271url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=7a56c10ff83e62f236b0dc330aab6c31

Trust: 0.1

title:Debian Security Advisories: DSA-3035-1 bash -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=f4f02191845c862da8b42c8e3db24b63

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-418url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-418

Trust: 0.1

title:Red Hat: CVE-2014-6271url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-6271

Trust: 0.1

title:BSY-reporturl:https://github.com/sulsseo/BSY-report

Trust: 0.1

title:CGIShellurl:https://github.com/cj1324/CGIShell

Trust: 0.1

title:Safety-Project-Collectionurl:https://github.com/Bypass007/Safety-Project-Collection

Trust: 0.1

sources: VULMON: CVE-2014-6271

EXTERNAL IDS

db:NVDid:CVE-2014-6271

Trust: 2.2

db:CERT/CCid:VU#252743

Trust: 1.8

db:BIDid:70103

Trust: 1.3

db:SECUNIAid:61312

Trust: 1.0

db:SECUNIAid:62228

Trust: 1.0

db:SECUNIAid:60193

Trust: 1.0

db:SECUNIAid:61065

Trust: 1.0

db:SECUNIAid:60024

Trust: 1.0

db:SECUNIAid:61128

Trust: 1.0

db:SECUNIAid:61603

Trust: 1.0

db:SECUNIAid:61700

Trust: 1.0

db:SECUNIAid:61711

Trust: 1.0

db:SECUNIAid:61283

Trust: 1.0

db:SECUNIAid:61542

Trust: 1.0

db:SECUNIAid:61552

Trust: 1.0

db:SECUNIAid:61188

Trust: 1.0

db:SECUNIAid:60063

Trust: 1.0

db:SECUNIAid:61442

Trust: 1.0

db:SECUNIAid:61855

Trust: 1.0

db:SECUNIAid:61641

Trust: 1.0

db:SECUNIAid:59737

Trust: 1.0

db:SECUNIAid:61857

Trust: 1.0

db:SECUNIAid:61816

Trust: 1.0

db:SECUNIAid:61291

Trust: 1.0

db:SECUNIAid:61715

Trust: 1.0

db:SECUNIAid:61633

Trust: 1.0

db:SECUNIAid:60325

Trust: 1.0

db:SECUNIAid:60044

Trust: 1.0

db:SECUNIAid:58200

Trust: 1.0

db:SECUNIAid:61471

Trust: 1.0

db:SECUNIAid:60433

Trust: 1.0

db:SECUNIAid:61129

Trust: 1.0

db:SECUNIAid:61676

Trust: 1.0

db:SECUNIAid:61873

Trust: 1.0

db:SECUNIAid:61565

Trust: 1.0

db:SECUNIAid:61547

Trust: 1.0

db:SECUNIAid:62312

Trust: 1.0

db:SECUNIAid:61780

Trust: 1.0

db:SECUNIAid:60034

Trust: 1.0

db:SECUNIAid:61703

Trust: 1.0

db:SECUNIAid:59272

Trust: 1.0

db:SECUNIAid:61313

Trust: 1.0

db:SECUNIAid:59907

Trust: 1.0

db:SECUNIAid:61485

Trust: 1.0

db:SECUNIAid:61654

Trust: 1.0

db:SECUNIAid:61643

Trust: 1.0

db:SECUNIAid:62343

Trust: 1.0

db:SECUNIAid:61287

Trust: 1.0

db:SECUNIAid:61503

Trust: 1.0

db:SECUNIAid:60947

Trust: 1.0

db:SECUNIAid:60055

Trust: 1.0

db:SECUNIAid:61328

Trust: 1.0

db:SECUNIAid:61550

Trust: 1.0

db:PACKETSTORMid:128517

Trust: 1.0

db:PACKETSTORMid:128567

Trust: 1.0

db:PACKETSTORMid:128573

Trust: 1.0

db:PACKETSTORMid:137376

Trust: 1.0

db:PACKETSTORMid:161107

Trust: 1.0

db:EXPLOIT-DBid:42938

Trust: 1.0

db:EXPLOIT-DBid:39918

Trust: 1.0

db:EXPLOIT-DBid:37816

Trust: 1.0

db:EXPLOIT-DBid:38849

Trust: 1.0

db:EXPLOIT-DBid:34879

Trust: 1.0

db:EXPLOIT-DBid:40619

Trust: 1.0

db:EXPLOIT-DBid:40938

Trust: 1.0

db:JVNDBid:JVNDB-2014-000126

Trust: 1.0

db:JUNIPERid:JSA10648

Trust: 1.0

db:JUNIPERid:JSA10673

Trust: 1.0

db:MCAFEEid:SB10085

Trust: 1.0

db:JVNid:JVN55667175

Trust: 1.0

db:USCERTid:TA14-268A

Trust: 1.0

db:VULMONid:CVE-2014-6271

Trust: 0.1

db:PACKETSTORMid:129074

Trust: 0.1

db:PACKETSTORMid:129069

Trust: 0.1

db:PACKETSTORMid:128537

Trust: 0.1

db:PACKETSTORMid:128752

Trust: 0.1

db:PACKETSTORMid:129438

Trust: 0.1

db:PACKETSTORMid:133070

Trust: 0.1

db:PACKETSTORMid:128545

Trust: 0.1

db:PACKETSTORMid:128513

Trust: 0.1

sources: CERT/CC: VU#252743 // VULMON: CVE-2014-6271 // BID: 70103 // PACKETSTORM: 129074 // PACKETSTORM: 129069 // PACKETSTORM: 128537 // PACKETSTORM: 128752 // PACKETSTORM: 129438 // PACKETSTORM: 133070 // PACKETSTORM: 128545 // PACKETSTORM: 128513 // NVD: CVE-2014-6271

REFERENCES

url:https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

Trust: 2.6

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash

Trust: 1.9

url:https://access.redhat.com/articles/1200223

Trust: 1.8

url:http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html

Trust: 1.8

url:http://support.apple.com/kb/ht6495

Trust: 1.8

url:https://kb.bluecoat.com/index?page=content&id=sa82

Trust: 1.8

url:http://www.debian.org/security/2014/dsa-3032

Trust: 1.8

url:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html

Trust: 1.8

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10085

Trust: 1.8

url:http://support.novell.com/security/cve/cve-2014-6271.html

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2014-1354.html

Trust: 1.1

url:http://secunia.com/advisories/61129

Trust: 1.0

url:http://www.us-cert.gov/ncas/alerts/ta14-268a

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686084

Trust: 1.0

url:http://secunia.com/advisories/61287

Trust: 1.0

url:http://secunia.com/advisories/59737

Trust: 1.0

url:http://secunia.com/advisories/62228

Trust: 1.0

url:http://secunia.com/advisories/61552

Trust: 1.0

url:http://linux.oracle.com/errata/elsa-2014-1294.html

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=1141597

Trust: 1.0

url:http://secunia.com/advisories/60947

Trust: 1.0

url:http://secunia.com/advisories/60044

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383244821813&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141450491804793&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141585637922673&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141694386919794&w=2

Trust: 1.0

url:http://secunia.com/advisories/61065

Trust: 1.0

url:http://secunia.com/advisories/61816

Trust: 1.0

url:http://secunia.com/advisories/61643

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915

Trust: 1.0

url:http://secunia.com/advisories/62312

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141577297623641&w=2

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:164

Trust: 1.0

url:http://secunia.com/advisories/61676

Trust: 1.0

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.0

url:http://secunia.com/advisories/60024

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html

Trust: 1.0

url:https://www.exploit-db.com/exploits/42938/

Trust: 1.0

url:http://www.securityfocus.com/archive/1/533593/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/60063

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142358026505815&w=2

Trust: 1.0

url:http://advisories.mageia.org/mgasa-2014-0388.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685604

Trust: 1.0

url:http://secunia.com/advisories/61703

Trust: 1.0

url:http://www.kb.cert.org/vuls/id/252743

Trust: 1.0

url:http://secunia.com/advisories/61188

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-2362-1

Trust: 1.0

url:http://www.novell.com/support/kb/doc.php?id=7015721

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687079

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-1293.html

Trust: 1.0

url:https://www.exploit-db.com/exploits/37816/

Trust: 1.0

url:http://packetstormsecurity.com/files/128573/apache-mod_cgi-remote-command-execution.html

Trust: 1.0

url:http://packetstormsecurity.com/files/137376/ipfire-bash-environment-variable-injection-shellshock.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142805027510172&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383304022067&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383196021590&w=2

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2014-0010.html

Trust: 1.0

url:http://jvndb.jvn.jp/jvndb/jvndb-2014-000126

Trust: 1.0

url:http://jvn.jp/en/jp/jvn55667175/index.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141330468527613&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142719845423222&w=2

Trust: 1.0

url:http://secunia.com/advisories/61542

Trust: 1.0

url:https://www.exploit-db.com/exploits/38849/

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686479

Trust: 1.0

url:https://support.citrix.com/article/ctx200223

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383465822787&w=2

Trust: 1.0

url:http://secunia.com/advisories/60193

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897

Trust: 1.0

url:https://www.exploit-db.com/exploits/39918/

Trust: 1.0

url:https://access.redhat.com/node/1200223

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-1295.html

Trust: 1.0

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006

Trust: 1.0

url:http://secunia.com/advisories/61128

Trust: 1.0

url:http://www.novell.com/support/kb/doc.php?id=7015701

Trust: 1.0

url:http://secunia.com/advisories/61873

Trust: 1.0

url:http://www.qnap.com/i/en/support/con_show.php?cid=61

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686246

Trust: 1.0

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04518183

Trust: 1.0

url:http://secunia.com/advisories/59272

Trust: 1.0

url:http://secunia.com/advisories/61328

Trust: 1.0

url:http://packetstormsecurity.com/files/128517/vmware-security-advisory-2014-0010.html

Trust: 1.0

url:http://secunia.com/advisories/61283

Trust: 1.0

url:http://packetstormsecurity.com/files/161107/sonicwall-ssl-vpn-shellshock-remote-code-execution.html

Trust: 1.0

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685749

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685541

Trust: 1.0

url:http://secunia.com/advisories/61603

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141216207813411&w=2

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10673

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685733

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html

Trust: 1.0

url:https://support.citrix.com/article/ctx200217

Trust: 1.0

url:http://secunia.com/advisories/62343

Trust: 1.0

url:https://support.apple.com/kb/ht6535

Trust: 1.0

url:http://secunia.com/advisories/61313

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141330425327438&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383081521087&w=2

Trust: 1.0

url:http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141577241923505&w=2

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279

Trust: 1.0

url:http://secunia.com/advisories/61654

Trust: 1.0

url:https://www.exploit-db.com/exploits/40938/

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142721162228379&w=2

Trust: 1.0

url:http://secunia.com/advisories/61641

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141577137423233&w=2

Trust: 1.0

url:https://www.exploit-db.com/exploits/34879/

Trust: 1.0

url:http://www.securityfocus.com/bid/70103

Trust: 1.0

url:http://secunia.com/advisories/60325

Trust: 1.0

url:http://secunia.com/advisories/61550

Trust: 1.0

url:http://secunia.com/advisories/61471

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686447

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685914

Trust: 1.0

url:http://secunia.com/advisories/61312

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383353622268&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141345648114150&w=2

Trust: 1.0

url:http://secunia.com/advisories/58200

Trust: 1.0

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673&src=securityalerts

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141319209015420&w=2

Trust: 1.0

url:http://secunia.com/advisories/61780

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686131

Trust: 1.0

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html

Trust: 1.0

url:http://secunia.com/advisories/60433

Trust: 1.0

url:http://secunia.com/advisories/61503

Trust: 1.0

url:http://secunia.com/advisories/59907

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686494

Trust: 1.0

url:http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0

Trust: 1.0

url:https://www.exploit-db.com/exploits/40619/

Trust: 1.0

url:http://secunia.com/advisories/61291

Trust: 1.0

url:http://secunia.com/advisories/61485

Trust: 1.0

url:http://secunia.com/advisories/61565

Trust: 1.0

url:http://secunia.com/advisories/61700

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141235957116749&w=2

Trust: 1.0

url:http://secunia.com/advisories/61715

Trust: 1.0

url:http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html

Trust: 1.0

url:http://secunia.com/advisories/60055

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-1294.html

Trust: 1.0

url:http://seclists.org/fulldisclosure/2014/oct/0

Trust: 1.0

url:http://linux.oracle.com/errata/elsa-2014-1293.html

Trust: 1.0

url:http://secunia.com/advisories/61547

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141216668515282&w=2

Trust: 1.0

url:http://secunia.com/advisories/61711

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383026420882&w=2

Trust: 1.0

url:http://secunia.com/advisories/61442

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141879528318582&w=2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html

Trust: 1.0

url:http://secunia.com/advisories/61857

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142118135300698&w=2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html

Trust: 1.0

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10648

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142113462216480&w=2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383138121313&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142546741516006&w=2

Trust: 1.0

url:http://secunia.com/advisories/61855

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141576728022234&w=2

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879

Trust: 1.0

url:http://secunia.com/advisories/60034

Trust: 1.0

url:https://www.suse.com/support/shellshock/

Trust: 1.0

url:http://secunia.com/advisories/61633

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142358078406056&w=2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686445

Trust: 1.0

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04497075

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361

Trust: 1.0

url:http://seclists.org/oss-sec/2014/q3/650

Trust: 0.8

url:http://seclists.org/oss-sec/2014/q3/688

Trust: 0.8

url:http://seclists.org/oss-sec/2014/q3/685

Trust: 0.8

url:http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html

Trust: 0.8

url:https://gist.github.com/anonymous/929d622f3b36b00c0be1

Trust: 0.8

url:https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html

Trust: 0.8

url:https://shellshocker.net/#

Trust: 0.8

url:https://www.barracuda.com/support/techalerts

Trust: 0.8

url:http://www.checkpoint.com/blog/protecting-shellshock/index.html

Trust: 0.8

url:http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044

Trust: 0.8

url:http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf

Trust: 0.8

url:http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/

Trust: 0.8

url:http://www.fortiguard.com/advisory/fg-ir-14-030/

Trust: 0.8

url:http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml

Trust: 0.8

url:http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0

Trust: 0.8

url:http://kb.juniper.net/jsa10648

Trust: 0.8

url:http://jpn.nec.com/security-info/av14-003.html

Trust: 0.8

url:https://www.suse.com/support/kb/doc.php?id=7015702

Trust: 0.8

url:http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193

Trust: 0.8

url:http://www.ubuntu.com/usn/usn-2362-1/

Trust: 0.8

url:http://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2090740

Trust: 0.8

url:http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-6271

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-7169

Trust: 0.7

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.6

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-7186

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-7187

Trust: 0.4

url:http://www.gnu.org/software/bash/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-6277

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-6278

Trust: 0.3

url:http://h20566.www2.hp.com/portal/site/hpsc/template.page/action.pro

Trust: 0.1

url:https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402-vbox.ova

Trust: 0.1

url:https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402.ova

Trust: 0.1

url:http://www.hp.com/support/eslg3

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-7169.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-7186.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-1568.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-7187.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/ht

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-6271.html

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1568

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.1

url:https://www.vantagepoint.sg/

Trust: 0.1

url:https://tools.cisco.com/quickview/bug/cscum05290

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37111

Trust: 0.1

url:https://tools.cisco.com/quickview/bug/cscus88031

Trust: 0.1

url:http://www.cisco.com/

Trust: 0.1

url:https://tools.cisco.com/quickview/bug/cscur49414

Trust: 0.1

url:https://cucm.example.com/:8443/reporter-servlet/getfilecontent?location=/&filename=/usr/local/thirdparty/jakarta-tomcat/conf/tomcat-users.xml

Trust: 0.1

url:https://cucm.example.com:8443/cmplatform/pingexecute?hostname=10.0.0.1&interval=1.0&packetsize=12&count=1000&secure=false

Trust: 0.1

sources: CERT/CC: VU#252743 // BID: 70103 // PACKETSTORM: 129074 // PACKETSTORM: 129069 // PACKETSTORM: 128537 // PACKETSTORM: 128752 // PACKETSTORM: 129438 // PACKETSTORM: 133070 // PACKETSTORM: 128545 // PACKETSTORM: 128513 // NVD: CVE-2014-6271

CREDITS

HP

Trust: 0.6

sources: PACKETSTORM: 129074 // PACKETSTORM: 129069 // PACKETSTORM: 128752 // PACKETSTORM: 129438 // PACKETSTORM: 128545 // PACKETSTORM: 128513

SOURCES

db:CERT/CCid:VU#252743
db:VULMONid:CVE-2014-6271
db:BIDid:70103
db:PACKETSTORMid:129074
db:PACKETSTORMid:129069
db:PACKETSTORMid:128537
db:PACKETSTORMid:128752
db:PACKETSTORMid:129438
db:PACKETSTORMid:133070
db:PACKETSTORMid:128545
db:PACKETSTORMid:128513
db:NVDid:CVE-2014-6271

LAST UPDATE DATE

2025-03-31T15:58:28.158000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#252743date:2015-04-14T00:00:00
db:VULMONid:CVE-2014-6271date:2021-11-17T00:00:00
db:BIDid:70103date:2016-07-06T14:58:00
db:NVDid:CVE-2014-6271date:2025-03-13T19:08:10.200

SOURCES RELEASE DATE

db:CERT/CCid:VU#252743date:2014-09-25T00:00:00
db:VULMONid:CVE-2014-6271date:2014-09-24T00:00:00
db:BIDid:70103date:2014-09-24T00:00:00
db:PACKETSTORMid:129074date:2014-11-12T18:14:28
db:PACKETSTORMid:129069date:2014-11-12T18:13:47
db:PACKETSTORMid:128537date:2014-10-03T00:57:40
db:PACKETSTORMid:128752date:2014-10-20T13:14:00
db:PACKETSTORMid:129438date:2014-12-09T23:15:30
db:PACKETSTORMid:133070date:2015-08-13T15:41:16
db:PACKETSTORMid:128545date:2014-10-03T23:31:42
db:PACKETSTORMid:128513date:2014-10-01T14:44:00
db:NVDid:CVE-2014-6271date:2014-09-24T18:48:04.477