ID

VAR-201409-1156


CVE

CVE-2014-6271


TITLE

GNU Bash shell executes commands in exported functions in environment variables

Trust: 0.8

sources: CERT/CC: VU#252743

DESCRIPTION

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04558068 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04558068 Version: 1 HPSBMU03246 rev.1 - HP Insight Control for Linux Central Management Server Pre-boot Execution Environment running Bash Shell, Multiple Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-02-02 Last Updated: 2015-02-02 Potential Security Impact: Multiple vulnerabilities Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Insight Control for Linux Central Management Server Pre-boot Execution Environment that could be exploited remotely resulting in Denial of Service (DoS), disclosure of information, and other vulnerabilities. References: CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 CVE-2014-7196 SSRT101742 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control for Linux Central Management Server Pre-boot Execution Environment running Bash Shell BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7196 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following instructions to resolve these vulnerabilities. Follow these steps to update the HP Insight Control for Linux Central Management Server Pre-boot Execution Environment: NOTE: The following procedure updates the bash shell on the Linux Pre-boot Execution Environment. Please update the Bash shell version on the HP Insight Control for Linux Central Management Server also. 1. On the Production RHEL 6.2 OS: a. Prepare temporary directory for Bash update software: # mkdir -p $HOME/tmp/bash # cd $HOME/tmp/bash # pwd <home directory>/tmp/bash b. Download the file 'bash-4.1.2-15.el6_4.2.i686.rpm' for Insight Control for Linux Red Hat 6.2 i386 from https://rhn.redhat.com/errata/RHSA-2014-1311.html to the temporary directory '$HOME/tmp/bash'. c. Extract the Bash update software package. # rpm2cpio bash-4.1.2-15.el6_4.2.i686.rpm| cpio -idmv d. Verify the version of the Bash update software: # ./bin/bash --version GNU bash, version 4.1.2(1)-release (i686-redhat-linux-gnu) e. Verify version dependencies: # ldd ./bin/bash linux-gate.so.1 => (0x008a7000) libtinfo.so.5 => /lib/libtinfo.so.5 (0x00459000) libdl.so.2 => /lib/libdl.so.2 (0x002c0000) libc.so.6 => /lib/libc.so.6 (0x0012e000) /lib/ld-linux.so.2 (0x00108000) f. Create archive file from '/lib' to copy and install on the Insight Control for Linux Central Management Server Pre-boot Execution Environment system: # mkdir $HOME/tmp/lib # cd /lib # cp * $HOME/tmp/lib # cd $HOME/tmp # pwd <home directory>/tmp # tar cvf bash_lib.tar * 2. Download the new archive file '$HOME/tmp/bash_lib.tar' from the Production RHEL 6.2 OS system to the Insight Control for Linux Central Management Server Pre-boot Execution Environment system. 3. On the HP Insight Control for Linux Central Managment Server Pre-boot Execution Environment system: a. Create a temporary folder for the toolkit and copy the toolkit there : # mkdir -p $HOME/tmp/temp-toolkit # cp /usr/share/systemimager/boot/i386/standard/toolkit.tar.gz $HOME/tmp/temp-toolkit b. Extract the file 'toolkit.tar.gz' into the temporary folder: # cd $HOME/tmp/temp-toolkit # tar zxvf toolkit.tar.gz # mv $HOME/tmp/temp-toolkit/toolkit.tar.gz /tmp c. Verify the version of the toolkit Bash: # $HOME/tmp/temp-toolkit/bin/bash --version GNU bash, version 3.2.0(1)-release (i386-pc-linux-gnu) Copyright (C) 2005 Free Software Foundation, Inc. d. Verify dependencies versions: # ldd $HOME/tmp/temp-toolkit/bin/bash linux-gate.so.1 => (0xffffe000) libtermcap.so.2 => /lib/libtermcap.so.2 (0xf7f8c000) libdl.so.2 => /lib/libdl.so.2 (0x008bf000) libc.so.6 => /lib/libc.so.6 (0x00777000) /lib/ld-linux.so.2 (0x00755000) e. Extract the archive 'bash_lib.tar' to directory '$HOME/tmp/bash_lib' . Then copy the bash binary and the library files to their respective locations: # tar xvf $HOME/tmp/bash_lib # cp $HOME/tmp/bash_lib/bash/bash $HOME/tmp/temp-toolkit/bin # cp $HOME/tmp/bash_lib/lib/* $HOME/tmp/temp-toolkit/lib f. Create the updated toolkit gzipped archive file and place in /usr/share/systemimager/boot/i386/standard # tar czvf toolkit.tar.gz * # cp toolkit.tar.gz /usr/share/systemimager/boot/i386/standard HISTORY Version:1 (rev.1) - 2 February 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlTP2EgACgkQ4B86/C0qfVnMkQCg8yH4xRTp9ahC3s4vDiCBmKiV JTwAoPl3SC09DPRWwo1zluDWFF1OfMtA =w7+V -----END PGP SIGNATURE----- . - The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "Poodle", which could be exploited remotely resulting in disclosure of information. References: CVE-2014-0224 Heartbleed - Remote Unauthorized Access, Disclosure of Information CVE-2014-3566 POODLE - Remote Disclosure of Information CVE-2014-6271 Shellshock - Remote Code Execution CVE-2014-7169 Shellshock - Remote Code Execution SSRT101835 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. The shell is not accessible via the standard calibration or remote management interfaces. This bulletin will be revised when the update is available. MITIGATION INFORMATION HP recommends the following steps to reduce the risk of this vulnerability: - Place the HP StoreFabric H-series switch and other data center critical infrastructure behind a firewall to disallow access from the Internet. - Change all HP StoreFabric switch default account passwords, including the root passwords, from the default factory passwords. - Examine the list of accounts, including ones on the switch and those existing on remote authentication servers such as RADIUS, LDAP, and TACAS+, to ensure only necessary personnel can gain access to HP StoreFabric H-series switches. Delete guest accounts and temporary accounts created for one-time usage needs. - To avoid possible exploit through the embedded web GUI, QuickTools, disable the web server with the following procedure: NOTE: After completing this procedure, the user will not be able to manage the switch using QuickTools. Login to the Command Line Interface (CLI). Execute the "admin start" command to enter into an admin session. Execute the "set setup services" command and change setting for EmbeddedGUIEnabled to "False". NOTE: Only the Z27x model is vulnerable. The unit provides Calibration Software running on embedded Linux, which includes a Bash Shell. The software is used for service purposes only. Please refer to the RESOLUTION section below for a list of impacted products

Trust: 2.7

sources: NVD: CVE-2014-6271 // CERT/CC: VU#252743 // BID: 70103 // VULMON: CVE-2014-6271 // PACKETSTORM: 130336 // PACKETSTORM: 129067 // PACKETSTORM: 131275 // PACKETSTORM: 128763 // PACKETSTORM: 128545 // PACKETSTORM: 129073 // PACKETSTORM: 128513 // PACKETSTORM: 128755

AFFECTED PRODUCTS

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 1.3

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 1.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 1.3

vendor:ibmmodel:storwize v7000scope:gteversion:1.5.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.13.9

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:1.1.0.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.5.1

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:10.1.129.11r1

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:software defined network for virtual environmentsscope:ltversion:1.2.1

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:3.8.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-iq devicescope:lteversion:4.4.0

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:gteversion:1.1.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.3_s390x

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:7.0_ppc64

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.4.1

Trust: 1.0

vendor:f5model:big-iq cloudscope:gteversion:4.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:8.2

Trust: 1.0

vendor:novellmodel:open enterprise serverscope:eqversion:2.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.0.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.1

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:2.1.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.9.12

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.3

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.3

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.8

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:3.1.1

Trust: 1.0

vendor:f5model:arxscope:lteversion:6.4.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.10.9

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:4.1.2.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:4.0.5

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:5.9

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:4.1.2.06

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:6.4_ppc64

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:lteversion:1.1.0.4

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:10.2.4

Trust: 1.0

vendor:checkpointmodel:security gatewayscope:ltversion:r77.30

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.6_ppc64

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:2.3.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.5.1

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:7.2.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.4_s390x

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:f5model:big-iq devicescope:gteversion:4.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:5.9_ppc

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.6

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.3

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:3.9.1.08

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.3.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.9.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.4.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:10.5.52.11r1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.5.1

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:10.2.4

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.10.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:3.3.2

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.2

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:3.4

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:gteversion:7.3.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.5

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:10.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:5.9

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:3.8.0.07

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.5.1

Trust: 1.0

vendor:susemodel:studio onsitescope:eqversion:1.3

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:workload deployerscope:lteversion:3.1.0.7

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:10.1.0

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:4.1.2.0

Trust: 1.0

vendor:mageiamodel:mageiascope:eqversion:4.0

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.5

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:5.6

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.5

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.3.0.7

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:3.9.1.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.3.0.7

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.4_ppc64

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:4.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.5

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:6

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.4

Trust: 1.0

vendor:ibmmodel:stn6800scope:gteversion:3.8.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.9

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:ltversion:7.1.0.11

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:3.9.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.2.0.9

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:5.0_ppc

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:10.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:6.0_ppc64

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:7.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.7

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.2

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.2.0.9

Trust: 1.0

vendor:f5model:big-iq securityscope:gteversion:4.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:f5model:big-iq securityscope:lteversion:4.4.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:4.1.2.06

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:stn7800scope:gteversion:3.8.0.0

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:2.3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:3.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.7

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.14.4f

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:1.1.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11

Trust: 1.0

vendor:ibmmodel:smartcloud provisioningscope:eqversion:2.1.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:1.1.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.0.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.14.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:11.4.1

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.13.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.3_ppc64

Trust: 1.0

vendor:ibmmodel:qradar risk managerscope:eqversion:7.1.0

Trust: 1.0

vendor:ibmmodel:starter kit for cloudscope:eqversion:2.2.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:ltversion:7.1.0.11

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:3.9.1.08

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:4.1.2.06

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:ltversion:7.1.0.11

Trust: 1.0

vendor:qnapmodel:qtsscope:eqversion:4.1.1

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.1

Trust: 1.0

vendor:gnumodel:bashscope:lteversion:4.3

Trust: 1.0

vendor:ibmmodel:workload deployerscope:gteversion:3.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.7

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.2

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:10.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:10.0.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.3.0.7

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.3.0

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:6.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:gteversion:10.5

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.6_s390x

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:7.3.0.7

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.1

Trust: 1.0

vendor:f5model:arxscope:gteversion:6.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:11.6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.5_ppc64

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:9.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.0.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.2

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:11.3.0

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.2.0.9

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:7.2.0.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:3.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.7_s390x

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.2.0.9

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:11.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:6.5_s390x

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.5.1

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:4.0.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.2

Trust: 1.0

vendor:ibmmodel:security access manager for web 8.0scope:eqversion:8.0.0.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:10.2.4

Trust: 1.0

vendor:ibmmodel:smartcloud entry appliancescope:eqversion:2.4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.5_s390x

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:3.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:lteversion:1.0.0.4

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:7.7_ppc64

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:1.1.0.0

Trust: 1.0

vendor:ibmmodel:infosphere guardium database activity monitoringscope:eqversion:9.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.5.1

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:6.4_s390x

Trust: 1.0

vendor:ibmmodel:storwize v3700scope:gteversion:7.3.0.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.11.11

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:5.9_s390x

Trust: 1.0

vendor:novellmodel:open enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:ibmmodel:storwize v3500scope:gteversion:7.3.0.0

Trust: 1.0

vendor:mageiamodel:mageiascope:eqversion:3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:5.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:10.0.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.11.0

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:1.5.0.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.7

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.4

Trust: 1.0

vendor:ibmmodel:san volume controllerscope:ltversion:7.1.0.11

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endian eusscope:eqversion:6.5_ppc64

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:ibmmodel:pureapplication systemscope:gteversion:1.0.0.0

Trust: 1.0

vendor:ibmmodel:flex system v7000scope:ltversion:7.1.0.11

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-iq cloudscope:lteversion:4.4.0

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:4

Trust: 1.0

vendor:ibmmodel:storwize v5000scope:gteversion:7.3.0.0

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:ltversion:9.3.67.5r1

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.7

Trust: 1.0

vendor:novellmodel:zenworks configuration managementscope:eqversion:10.3

Trust: 1.0

vendor:ibmmodel:stn6500scope:ltversion:3.8.0.07

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.8.15

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.8

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.6

Trust: 1.0

vendor:ibmmodel:stn7800scope:ltversion:3.9.1.08

Trust: 1.0

vendor:vmwaremodel:vcenter server appliancescope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.1

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:11.0.0

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:citrixmodel:netscaler sdxscope:gteversion:10

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.8

Trust: 1.0

vendor:redhatmodel:enterprise linux server from rhuiscope:eqversion:5.0

Trust: 1.0

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.6

Trust: 1.0

vendor:qnapmodel:qtsscope:ltversion:4.1.1

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.12.9

Trust: 1.0

vendor:redhatmodel:gluster storage server for on-premisescope:eqversion:2.1

Trust: 1.0

vendor:ibmmodel:security access manager for mobile 8.0scope:eqversion:8.0.0.2

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:4.1.2.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.12.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.5.1

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2

Trust: 1.0

vendor:ibmmodel:qradar security information and event managerscope:eqversion:7.2.6

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:ibmmodel:storwize v7000scope:ltversion:1.4.3.5

Trust: 1.0

vendor:ibmmodel:stn6800scope:ltversion:3.8.0.07

Trust: 1.0

vendor:ibmmodel:security access manager for web 7.0scope:eqversion:7.0.0.5

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.10.0

Trust: 1.0

vendor:ibmmodel:stn6500scope:gteversion:3.9.1.0

Trust: 1.0

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:barracudamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:cygwinmodel: - scope: - version: -

Trust: 0.8

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:extrememodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:fireeyemodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:gnu bashmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mageiamodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:monroemodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:niksunmodel: - scope: - version: -

Trust: 0.8

vendor:netappmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:palo altomodel: - scope: - version: -

Trust: 0.8

vendor:qnap securitymodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sophosmodel: - scope: - version: -

Trust: 0.8

vendor:trend micromodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:xirrusmodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:5.0.307.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1004

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1033

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1044

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.1

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.391.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1012

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1039

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.00.0(2)

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7238

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.539.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.434.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1031

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.399.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.365.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.474.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.2

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.326.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.76

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.40

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:ciscomodel:secure access control serverscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.530.0

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.348.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1010

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.2

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.18

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.82

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.395.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.6

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:78000

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.13

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1051

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1061

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.385.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.319.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.443.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.296.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.374.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.1

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.417.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.21

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1043

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1049

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7242

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.7

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.407.0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9393

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1057

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.518.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.346.0

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:70000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.421.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.390.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.35

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.438.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.39

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:1.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.462.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.11

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7235

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:eqversion:7.01

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.368.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.87

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.126

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.481.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.489.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.393.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.362.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.423.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.323.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.93

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.370.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.380.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.0

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5(2)

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.512.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.419.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.66

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.361.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1018

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.58

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.22

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.483.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.467.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.435.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.278.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.413.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1017

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.537.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.379.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.513.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.1

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.0

Trust: 0.3

vendor:hpmodel:insight controlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1062

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1020

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.469.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1042

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1058

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.158.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.49

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.334.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.506.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1054

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.414.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.494.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.484.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1030

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.85

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.328.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.482.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.479.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.381.0

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.394.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.364.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.521.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.520.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.349.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1022

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.528.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.7

Trust: 0.3

vendor:vmwaremodel:studioscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.3

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.2.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.2

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.1.4

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.476.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491064

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.61

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.345.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.325.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1026

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.33

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.431.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.347.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.498.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.412.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1038

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.406.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.515.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.409.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.329.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1006

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.68

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:40000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.315.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.32

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.277.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.384.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.69

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.170.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.29

Trust: 0.3

vendor:ciscomodel:gss 4492r global site selectorscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.10

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.2-41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.422.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.1

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.1-32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.299.0

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0.193.2

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:1000v0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.371.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.8

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.272.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.411.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.496.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.363.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.294.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.367.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1016

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1045

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.36

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.454.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.28

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7245

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.337.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.301.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.96

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1032

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.80

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.473.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.441.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1040

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.88

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:8.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.440.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.426.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.343.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.355.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.327.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.477.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1055

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.22

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.67

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.516.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.430.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.493.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.457.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.21

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.0-407

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.29

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.308.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.211.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.92

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1019

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491036

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.522.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.341.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.95

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.152.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.338.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.451.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1015

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.480.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.19

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.30

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.4

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.427.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1024

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:6500

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.276.0

Trust: 0.3

vendor:avayamodel:secure access linkscope:eqversion:1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.544.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.1

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.8

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1041

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1021

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.336.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.305.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1034

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.38

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.1-340

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.98

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.2

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.320.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.12

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.224.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.33

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.339.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.424.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.39

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.2-33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1035

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.478.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.540.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.1

Trust: 0.3

vendor:xeroxmodel:phaserscope:eqversion:67000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.8

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.542.0

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.330.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1014

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.1

Trust: 0.3

vendor:vmwaremodel:studioscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1001

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.492.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.510.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.410.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1056

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1.0-1470

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.45

Trust: 0.3

vendor:mcafeemodel:email gateway hotfixscope:eqversion:6.7.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.405.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.292.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.153.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1029

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.4

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.7

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.378.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.62

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1037

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1060

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.300.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.509.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.387.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.97

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.290.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.386.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.425.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.485.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.486.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.48

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.372.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:vmwaremodel:studio betascope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.1

Trust: 0.3

vendor:gnumodel:bashscope:eqversion:3.0.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.392.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.403.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.221.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.45

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.5

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1063

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.0

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.72

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.304.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1028

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.289.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.31

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.487.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.3

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1046

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.303.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491059

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.332.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.159.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.73

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.60

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.3-29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.340.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1013

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.436.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1023

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.373.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.0

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9302

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.353.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.89

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.0

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7228

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.491.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:redmodel:hat enterprise linux long life serverscope:eqversion:5.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.1

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.4-26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.470.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.461.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.446.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.321.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.357.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.459.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.541.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.81

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.333.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.313.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.475.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.524.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.351.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.471.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1027

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.396.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.428.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.309.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.32

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:xeroxmodel:colorqubescope:eqversion:9301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.460.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.344.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1008

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.156.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:ibmmodel:ds8000scope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1053

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.455.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.488.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.526.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.449.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.505.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.400.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.497.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.287.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.286.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:gnumodel:bash rc1scope:eqversion:4.0

Trust: 0.3

vendor:emcmodel:avamarscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:7232

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.444.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.3

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:50000

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.358.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.548.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.58

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.24

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1007

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1047

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.456.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1052

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.525.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.8

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1009

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.74

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.432.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.89

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:emcmodel:avamar sp1scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.324.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1048

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1050

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.433.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.52

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.182.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.504.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.316.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:ciscomodel:unified computing systemscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.90

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.3

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.464.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.271.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:30000

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.359.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.383.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.376.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1025

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.33

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.295.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.3

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.538.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.519.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.318.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1011

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: CERT/CC: VU#252743 // BID: 70103 // NVD: CVE-2014-6271

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-6271
value: CRITICAL

Trust: 1.0

VULMON: CVE-2014-6271
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-6271
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2014-6271
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2014-6271 // NVD: CVE-2014-6271

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

sources: NVD: CVE-2014-6271

THREAT TYPE

network

Trust: 0.3

sources: BID: 70103

TYPE

Design Error

Trust: 0.3

sources: BID: 70103

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-6271

PATCH

title:Ubuntu Security Notice: bash vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2362-1

Trust: 0.1

title:Debian Security Advisories: DSA-3032-1 bash -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=50d43ccd8bbe4fa0648529a981b20a39

Trust: 0.1

title:Debian CVElist Bug Report Logs: bash: CVE-2014-7169: Incomplete fix for CVE-2014-6271url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=7a56c10ff83e62f236b0dc330aab6c31

Trust: 0.1

title:Debian Security Advisories: DSA-3035-1 bash -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=f4f02191845c862da8b42c8e3db24b63

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-418url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-418

Trust: 0.1

title:Red Hat: CVE-2014-6271url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-6271

Trust: 0.1

title:BSY-reporturl:https://github.com/sulsseo/BSY-report

Trust: 0.1

title:CGIShellurl:https://github.com/cj1324/CGIShell

Trust: 0.1

title:Safety-Project-Collectionurl:https://github.com/Bypass007/Safety-Project-Collection

Trust: 0.1

sources: VULMON: CVE-2014-6271

EXTERNAL IDS

db:NVDid:CVE-2014-6271

Trust: 2.2

db:CERT/CCid:VU#252743

Trust: 1.8

db:BIDid:70103

Trust: 1.3

db:SECUNIAid:61313

Trust: 1.0

db:SECUNIAid:61565

Trust: 1.0

db:SECUNIAid:59272

Trust: 1.0

db:SECUNIAid:62343

Trust: 1.0

db:SECUNIAid:61676

Trust: 1.0

db:SECUNIAid:62312

Trust: 1.0

db:SECUNIAid:61287

Trust: 1.0

db:SECUNIAid:60024

Trust: 1.0

db:SECUNIAid:61703

Trust: 1.0

db:SECUNIAid:61328

Trust: 1.0

db:SECUNIAid:61552

Trust: 1.0

db:SECUNIAid:60044

Trust: 1.0

db:SECUNIAid:61643

Trust: 1.0

db:SECUNIAid:60325

Trust: 1.0

db:SECUNIAid:61550

Trust: 1.0

db:SECUNIAid:60034

Trust: 1.0

db:SECUNIAid:59907

Trust: 1.0

db:SECUNIAid:61715

Trust: 1.0

db:SECUNIAid:61641

Trust: 1.0

db:SECUNIAid:60193

Trust: 1.0

db:SECUNIAid:61542

Trust: 1.0

db:SECUNIAid:61603

Trust: 1.0

db:SECUNIAid:61711

Trust: 1.0

db:SECUNIAid:61700

Trust: 1.0

db:SECUNIAid:61471

Trust: 1.0

db:SECUNIAid:59737

Trust: 1.0

db:SECUNIAid:58200

Trust: 1.0

db:SECUNIAid:60433

Trust: 1.0

db:SECUNIAid:60947

Trust: 1.0

db:SECUNIAid:61855

Trust: 1.0

db:SECUNIAid:61129

Trust: 1.0

db:SECUNIAid:61188

Trust: 1.0

db:SECUNIAid:61873

Trust: 1.0

db:SECUNIAid:61065

Trust: 1.0

db:SECUNIAid:62228

Trust: 1.0

db:SECUNIAid:61128

Trust: 1.0

db:SECUNIAid:61816

Trust: 1.0

db:SECUNIAid:61547

Trust: 1.0

db:SECUNIAid:61780

Trust: 1.0

db:SECUNIAid:61283

Trust: 1.0

db:SECUNIAid:61291

Trust: 1.0

db:SECUNIAid:60055

Trust: 1.0

db:SECUNIAid:61503

Trust: 1.0

db:SECUNIAid:61633

Trust: 1.0

db:SECUNIAid:61857

Trust: 1.0

db:SECUNIAid:61312

Trust: 1.0

db:SECUNIAid:60063

Trust: 1.0

db:SECUNIAid:61442

Trust: 1.0

db:SECUNIAid:61654

Trust: 1.0

db:SECUNIAid:61485

Trust: 1.0

db:JUNIPERid:JSA10648

Trust: 1.0

db:JUNIPERid:JSA10673

Trust: 1.0

db:PACKETSTORMid:128567

Trust: 1.0

db:PACKETSTORMid:161107

Trust: 1.0

db:PACKETSTORMid:128517

Trust: 1.0

db:PACKETSTORMid:128573

Trust: 1.0

db:PACKETSTORMid:137376

Trust: 1.0

db:EXPLOIT-DBid:39918

Trust: 1.0

db:EXPLOIT-DBid:42938

Trust: 1.0

db:EXPLOIT-DBid:40619

Trust: 1.0

db:EXPLOIT-DBid:38849

Trust: 1.0

db:EXPLOIT-DBid:34879

Trust: 1.0

db:EXPLOIT-DBid:37816

Trust: 1.0

db:EXPLOIT-DBid:40938

Trust: 1.0

db:USCERTid:TA14-268A

Trust: 1.0

db:MCAFEEid:SB10085

Trust: 1.0

db:JVNDBid:JVNDB-2014-000126

Trust: 1.0

db:JVNid:JVN55667175

Trust: 1.0

db:VULMONid:CVE-2014-6271

Trust: 0.1

db:PACKETSTORMid:130336

Trust: 0.1

db:PACKETSTORMid:129067

Trust: 0.1

db:PACKETSTORMid:131275

Trust: 0.1

db:PACKETSTORMid:128763

Trust: 0.1

db:PACKETSTORMid:128545

Trust: 0.1

db:PACKETSTORMid:129073

Trust: 0.1

db:PACKETSTORMid:128513

Trust: 0.1

db:PACKETSTORMid:128755

Trust: 0.1

sources: CERT/CC: VU#252743 // VULMON: CVE-2014-6271 // BID: 70103 // PACKETSTORM: 130336 // PACKETSTORM: 129067 // PACKETSTORM: 131275 // PACKETSTORM: 128763 // PACKETSTORM: 128545 // PACKETSTORM: 129073 // PACKETSTORM: 128513 // PACKETSTORM: 128755 // NVD: CVE-2014-6271

REFERENCES

url:https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

Trust: 2.6

url:https://access.redhat.com/articles/1200223

Trust: 1.8

url:http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html

Trust: 1.8

url:http://support.apple.com/kb/ht6495

Trust: 1.8

url:https://kb.bluecoat.com/index?page=content&id=sa82

Trust: 1.8

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash

Trust: 1.8

url:http://www.debian.org/security/2014/dsa-3032

Trust: 1.8

url:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html

Trust: 1.8

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10085

Trust: 1.8

url:http://support.novell.com/security/cve/cve-2014-6271.html

Trust: 1.8

url:http://advisories.mageia.org/mgasa-2014-0388.html

Trust: 1.0

url:http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html

Trust: 1.0

url:http://jvn.jp/en/jp/jvn55667175/index.html

Trust: 1.0

url:http://jvndb.jvn.jp/jvndb/jvndb-2014-000126

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10673

Trust: 1.0

url:http://linux.oracle.com/errata/elsa-2014-1293.html

Trust: 1.0

url:http://linux.oracle.com/errata/elsa-2014-1294.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141216207813411&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141216668515282&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141235957116749&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141319209015420&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141330425327438&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141330468527613&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141345648114150&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383026420882&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383081521087&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383138121313&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383196021590&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383244821813&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383304022067&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383353622268&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141383465822787&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141450491804793&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141576728022234&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141577137423233&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141577241923505&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141577297623641&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141585637922673&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141694386919794&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141879528318582&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142113462216480&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142118135300698&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142358026505815&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142358078406056&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142546741516006&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142719845423222&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142721162228379&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142805027510172&w=2

Trust: 1.0

url:http://packetstormsecurity.com/files/128517/vmware-security-advisory-2014-0010.html

Trust: 1.0

url:http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html

Trust: 1.0

url:http://packetstormsecurity.com/files/128573/apache-mod_cgi-remote-command-execution.html

Trust: 1.0

url:http://packetstormsecurity.com/files/137376/ipfire-bash-environment-variable-injection-shellshock.html

Trust: 1.0

url:http://packetstormsecurity.com/files/161107/sonicwall-ssl-vpn-shellshock-remote-code-execution.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-1293.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-1294.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-1295.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-1354.html

Trust: 1.0

url:http://seclists.org/fulldisclosure/2014/oct/0

Trust: 1.0

url:http://secunia.com/advisories/58200

Trust: 1.0

url:http://secunia.com/advisories/59272

Trust: 1.0

url:http://secunia.com/advisories/59737

Trust: 1.0

url:http://secunia.com/advisories/59907

Trust: 1.0

url:http://secunia.com/advisories/60024

Trust: 1.0

url:http://secunia.com/advisories/60034

Trust: 1.0

url:http://secunia.com/advisories/60044

Trust: 1.0

url:http://secunia.com/advisories/60055

Trust: 1.0

url:http://secunia.com/advisories/60063

Trust: 1.0

url:http://secunia.com/advisories/60193

Trust: 1.0

url:http://secunia.com/advisories/60325

Trust: 1.0

url:http://secunia.com/advisories/60433

Trust: 1.0

url:http://secunia.com/advisories/60947

Trust: 1.0

url:http://secunia.com/advisories/61065

Trust: 1.0

url:http://secunia.com/advisories/61128

Trust: 1.0

url:http://secunia.com/advisories/61129

Trust: 1.0

url:http://secunia.com/advisories/61188

Trust: 1.0

url:http://secunia.com/advisories/61283

Trust: 1.0

url:http://secunia.com/advisories/61287

Trust: 1.0

url:http://secunia.com/advisories/61291

Trust: 1.0

url:http://secunia.com/advisories/61312

Trust: 1.0

url:http://secunia.com/advisories/61313

Trust: 1.0

url:http://secunia.com/advisories/61328

Trust: 1.0

url:http://secunia.com/advisories/61442

Trust: 1.0

url:http://secunia.com/advisories/61471

Trust: 1.0

url:http://secunia.com/advisories/61485

Trust: 1.0

url:http://secunia.com/advisories/61503

Trust: 1.0

url:http://secunia.com/advisories/61542

Trust: 1.0

url:http://secunia.com/advisories/61547

Trust: 1.0

url:http://secunia.com/advisories/61550

Trust: 1.0

url:http://secunia.com/advisories/61552

Trust: 1.0

url:http://secunia.com/advisories/61565

Trust: 1.0

url:http://secunia.com/advisories/61603

Trust: 1.0

url:http://secunia.com/advisories/61633

Trust: 1.0

url:http://secunia.com/advisories/61641

Trust: 1.0

url:http://secunia.com/advisories/61643

Trust: 1.0

url:http://secunia.com/advisories/61654

Trust: 1.0

url:http://secunia.com/advisories/61676

Trust: 1.0

url:http://secunia.com/advisories/61700

Trust: 1.0

url:http://secunia.com/advisories/61703

Trust: 1.0

url:http://secunia.com/advisories/61711

Trust: 1.0

url:http://secunia.com/advisories/61715

Trust: 1.0

url:http://secunia.com/advisories/61780

Trust: 1.0

url:http://secunia.com/advisories/61816

Trust: 1.0

url:http://secunia.com/advisories/61855

Trust: 1.0

url:http://secunia.com/advisories/61857

Trust: 1.0

url:http://secunia.com/advisories/61873

Trust: 1.0

url:http://secunia.com/advisories/62228

Trust: 1.0

url:http://secunia.com/advisories/62312

Trust: 1.0

url:http://secunia.com/advisories/62343

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685541

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685604

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685733

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685749

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21685914

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686084

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686131

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686246

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686445

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686447

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686479

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686494

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687079

Trust: 1.0

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315

Trust: 1.0

url:http://www.kb.cert.org/vuls/id/252743

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:164

Trust: 1.0

url:http://www.novell.com/support/kb/doc.php?id=7015701

Trust: 1.0

url:http://www.novell.com/support/kb/doc.php?id=7015721

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html

Trust: 1.0

url:http://www.qnap.com/i/en/support/con_show.php?cid=61

Trust: 1.0

url:http://www.securityfocus.com/archive/1/533593/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/bid/70103

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-2362-1

Trust: 1.0

url:http://www.us-cert.gov/ncas/alerts/ta14-268a

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2014-0010.html

Trust: 1.0

url:http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0

Trust: 1.0

url:https://access.redhat.com/node/1200223

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=1141597

Trust: 1.0

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.0

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10648

Trust: 1.0

url:https://support.apple.com/kb/ht6535

Trust: 1.0

url:https://support.citrix.com/article/ctx200217

Trust: 1.0

url:https://support.citrix.com/article/ctx200223

Trust: 1.0

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04497075

Trust: 1.0

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04518183

Trust: 1.0

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673&src=securityalerts

Trust: 1.0

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006

Trust: 1.0

url:https://www.exploit-db.com/exploits/34879/

Trust: 1.0

url:https://www.exploit-db.com/exploits/37816/

Trust: 1.0

url:https://www.exploit-db.com/exploits/38849/

Trust: 1.0

url:https://www.exploit-db.com/exploits/39918/

Trust: 1.0

url:https://www.exploit-db.com/exploits/40619/

Trust: 1.0

url:https://www.exploit-db.com/exploits/40938/

Trust: 1.0

url:https://www.exploit-db.com/exploits/42938/

Trust: 1.0

url:https://www.suse.com/support/shellshock/

Trust: 1.0

url:http://seclists.org/oss-sec/2014/q3/650

Trust: 0.8

url:http://seclists.org/oss-sec/2014/q3/688

Trust: 0.8

url:http://seclists.org/oss-sec/2014/q3/685

Trust: 0.8

url:http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html

Trust: 0.8

url:https://gist.github.com/anonymous/929d622f3b36b00c0be1

Trust: 0.8

url:https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html

Trust: 0.8

url:https://shellshocker.net/#

Trust: 0.8

url:https://www.barracuda.com/support/techalerts

Trust: 0.8

url:http://www.checkpoint.com/blog/protecting-shellshock/index.html

Trust: 0.8

url:http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044

Trust: 0.8

url:http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf

Trust: 0.8

url:http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/

Trust: 0.8

url:http://www.fortiguard.com/advisory/fg-ir-14-030/

Trust: 0.8

url:http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml

Trust: 0.8

url:http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0

Trust: 0.8

url:http://kb.juniper.net/jsa10648

Trust: 0.8

url:http://jpn.nec.com/security-info/av14-003.html

Trust: 0.8

url:https://www.suse.com/support/kb/doc.php?id=7015702

Trust: 0.8

url:http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193

Trust: 0.8

url:http://www.ubuntu.com/usn/usn-2362-1/

Trust: 0.8

url:http://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2090740

Trust: 0.8

url:http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org

Trust: 0.8

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.8

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.8

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-7169

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-6271

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-7186

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-7187

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-6277

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-6278

Trust: 0.4

url:http://www.gnu.org/software/bash/

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-1311.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7196

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2104-6277

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2104-6278

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0224

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/km01194258

Trust: 0.1

sources: CERT/CC: VU#252743 // BID: 70103 // PACKETSTORM: 130336 // PACKETSTORM: 129067 // PACKETSTORM: 131275 // PACKETSTORM: 128763 // PACKETSTORM: 128545 // PACKETSTORM: 129073 // PACKETSTORM: 128513 // PACKETSTORM: 128755 // NVD: CVE-2014-6271

CREDITS

HP

Trust: 0.8

sources: PACKETSTORM: 130336 // PACKETSTORM: 129067 // PACKETSTORM: 131275 // PACKETSTORM: 128763 // PACKETSTORM: 128545 // PACKETSTORM: 129073 // PACKETSTORM: 128513 // PACKETSTORM: 128755

SOURCES

db:CERT/CCid:VU#252743
db:VULMONid:CVE-2014-6271
db:BIDid:70103
db:PACKETSTORMid:130336
db:PACKETSTORMid:129067
db:PACKETSTORMid:131275
db:PACKETSTORMid:128763
db:PACKETSTORMid:128545
db:PACKETSTORMid:129073
db:PACKETSTORMid:128513
db:PACKETSTORMid:128755
db:NVDid:CVE-2014-6271

LAST UPDATE DATE

2024-10-15T22:14:48.899000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#252743date:2015-04-14T00:00:00
db:VULMONid:CVE-2014-6271date:2021-11-17T00:00:00
db:BIDid:70103date:2016-07-06T14:58:00
db:NVDid:CVE-2014-6271date:2024-07-24T16:47:47.667

SOURCES RELEASE DATE

db:CERT/CCid:VU#252743date:2014-09-25T00:00:00
db:VULMONid:CVE-2014-6271date:2014-09-24T00:00:00
db:BIDid:70103date:2014-09-24T00:00:00
db:PACKETSTORMid:130336date:2015-02-10T17:43:27
db:PACKETSTORMid:129067date:2014-11-12T18:13:32
db:PACKETSTORMid:131275date:2015-04-03T15:46:45
db:PACKETSTORMid:128763date:2014-10-20T17:55:00
db:PACKETSTORMid:128545date:2014-10-03T23:31:42
db:PACKETSTORMid:129073date:2014-11-12T18:14:19
db:PACKETSTORMid:128513date:2014-10-01T14:44:00
db:PACKETSTORMid:128755date:2014-10-20T14:02:00
db:NVDid:CVE-2014-6271date:2014-09-24T18:48:04.477