ID

VAR-201410-0371


CVE

CVE-2014-3513


TITLE

OpenSSL of DTLS SRTP Extension d1_srtp.c Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-004939

DESCRIPTION

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. Successfully exploiting this issue will allow attackers to bypass security restrictions and perform unauthorized actions. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures: Red Hat Storage Server 2.1 - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Package List: Red Hat Storage Server 2.1: Source: openssl-1.0.1e-30.el6_6.2.src.rpm x86_64: openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. ============================================================================ Ubuntu Security Notice USN-2385-1 October 16, 2014 openssl vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in OpenSSL. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.7 Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.20 Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.22 After a standard system update you need to reboot your computer to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2015-0001 Synopsis: VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues Issue date: 2015-01-27 Updated on: 2015-01-27 (Initial Advisory) CVE number: CVE-2014-8370, CVE-2015-1043, CVE-2015-1044 --- OPENSSL--- CVE-2014-3513, CVE-2014-3567,CVE-2014-3566, CVE-2014-3568 --- libxml2 --- CVE-2014-3660 - ------------------------------------------------------------------------ 1. Summary VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues. 2. Relevant Releases VMware Workstation 10.x prior to version 10.0.5 VMware Player 6.x prior to version 6.0.5 VMware Fusion 7.x prior to version 7.0.1 VMware Fusion 6.x prior to version 6.0.5 vCenter Server 5.5 prior to Update 2d ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG ESXi 5.1 without patch ESXi510-201404101-SG ESXi 5.0 without patch ESXi500-201405101-SG 3. Problem Description a. VMware ESXi, Workstation, Player, and Fusion host privilege escalation vulnerability VMware ESXi, Workstation, Player and Fusion contain an arbitrary file write issue. Exploitation this issue may allow for privilege escalation on the host. The vulnerability does not allow for privilege escalation from the guest Operating System to the host or vice-versa. This means that host memory can not be manipulated from the Guest Operating System. Mitigation For ESXi to be affected, permissions must have been added to ESXi (or a vCenter Server managing it) for a virtual machine administrator role or greater. VMware would like to thank Shanon Olsson for reporting this issue to us through JPCERT. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-8370 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= Workstation 11.x any not affected Workstation 10.x any 10.0.5 Player 7.x any not affected Player 6.x any 6.0.5 Fusion 7.x any not affected Fusion 6.x any 6.0.5 ESXi 5.5 ESXi ESXi550-201403102-SG ESXi 5.1 ESXi ESXi510-201404101-SG ESXi 5.0 ESXi ESXi500-201405101-SG b. VMware Workstation, Player, and Fusion Denial of Service vulnerability VMware Workstation, Player, and Fusion contain an input validation issue in the Host Guest File System (HGFS). This issue may allow for a Denial of Service of the Guest Operating system. VMware would like to thank Peter Kamensky from Digital Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-1043 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= Workstation 11.x any not affected Workstation 10.x any 10.0.5 Player 7.x any not affected Player 6.x any 6.0.5 Fusion 7.x any 7.0.1 Fusion 6.x any 6.0.5 c. VMware ESXi, Workstation, and Player Denial of Service vulnerability VMware ESXi, Workstation, and Player contain an input validation issue in VMware Authorization process (vmware-authd). This issue may allow for a Denial of Service of the host. On VMware ESXi and on Workstation running on Linux the Denial of Service would be partial. VMware would like to thank Dmitry Yudin @ret5et for reporting this issue to us through HP's Zero Day Initiative. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-1044 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= Workstation 11.x any not affected Workstation 10.x any 10.0.5 Player 7.x any not affected Player 6.x any 6.0.5 Fusion 7.x any not affected Fusion 6.x any not affected ESXi 5.5 ESXi ESXi550-201501101-SG ESXi 5.1 ESXi ESXi510-201410101-SG ESXi 5.0 ESXi not affected d. Update to VMware vCenter Server and ESXi for OpenSSL 1.0.1 and 0.9.8 package The OpenSSL library is updated to version 1.0.1j or 0.9.8zc to resolve multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2014-3513, CVE-2014-3567, CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCenter Server 5.5 any Update 2d* vCenter Server 5.1 any patch pending vCenter Server 5.0 any patch pending ESXi 5.5 ESXi ESXi550-201501101-SG ESXi 5.1 ESXi patch pending ESXi 5.0 ESXi patch pending * The VMware vCenter 5.5 SSO component will be updated in a later release e. Update to ESXi libxml2 package The libxml2 library is updated to version libxml2-2.7.6-17 to resolve a security issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-3660 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= ESXi 5.5 ESXi ESXi550-201501101-SG ESXi 5.1 ESXi patch pending ESXi 5.0 ESXi patch pending 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Workstation 10.x -------------------------------- https://www.vmware.com/go/downloadworkstation VMware Player 6.x -------------------------------- https://www.vmware.com/go/downloadplayer VMware Fusion 7.x and 6.x -------------------------------- https://www.vmware.com/go/downloadplayer vCenter Server ---------------------------- Downloads and Documentation: https://www.vmware.com/go/download-vsphere ESXi 5.5 Update 2d ---------------------------- File: update-from-esxi5.5-5.5_update01.zip md5sum: 5773844efc7d8e43135de46801d6ea25 sha1sum: 6518355d260e81b562c66c5016781db9f077161f http://kb.vmware.com/kb/2065832 update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG ESXi 5.5 ---------------------------- File: ESXi550-201501001.zip md5sum: b0f2edd9ad17d0bae5a11782aaef9304 sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1 http://kb.vmware.com/kb/2099265 ESXi550-201501001.zip contains ESXi550-201501101-SG ESXi 5.1 ---------------------------- File: ESXi510-201404001.zip md5sum: 9dc3c9538de4451244a2b62d247e52c4 sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66 http://kb.vmware.com/kb/2070666 ESXi510-201404001 contains ESXi510-201404101-SG ESXi 5.0 ---------------------------- File: ESXi500-201405001.zip md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5 http://kb.vmware.com/kb/2075521 ESXi500-201405001 contains ESXi500-201405101-SG 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8370 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1043 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660 - ------------------------------------------------------------------------ 6. Change log 2015-01-27 VMSA-2015-0001 Initial security advisory in conjunction with the release of VMware Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d and, ESXi 5.5 Patches released on 2015-01-27. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735 VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2015 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.0 (Build 8741) Charset: utf-8 wj8DBQFUx/+UDEcm8Vbi9kMRAmzrAKDG7u8ZTSlfQzU3eFphjebNgDkW2ACfZ9JE c75UD0ctlJx5607JuLfnb6Y= =IxpT -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04616259 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04616259 Version: 1 HPSBHF03300 rev.1 - HP Network Products running OpenSSL, Remote Denial of Service (DoS), Unauthorized Access, Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-04-02 Last Updated: 2015-04-02 Potential Security Impact: Remote Denial of Service (DoS), unauthorized access, disclosure of information Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Network Products running OpenSSL including... The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", which could be exploited remotely resulting in disclosure of information. References: CVE-2014-3513 Remote Denial of Service (DoS) CVE-2014-3566 Remote Disclosure of Information (POODLE) CVE-2014-3567 Remote Denial of Service (DoS) CVE-2014-3568 Remote Unauthorized Access SSRT101997, SSRT101774 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION section below for a list of impacted products. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-3513 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following software updates to resolve the vulnerabilities in the HP Networking products listed. Note: mitigation instructions are included below if the following software updates cannot be applied. Family Fixed Version HP Branded Products Impacted H3C Branded Products Impacted 3Com Branded Products Impacted CVE 12900 Switch Series R1005P15 JG619A HP FF 12910 Switch AC Chassis JG621A HP FF 12910 Main Processing Unit JG632A HP FF 12916 Switch AC Chassis JG634A HP FF 12916 Main Processing Unit CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 12500 R1828P06 JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JC808A HP 12500 TAA Main Processing Unit H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M) H3C 12508 DC Switch Chassis (0235A38L) H3C 12518 DC Switch Chassis (0235A38K) CVE-2014-3566 CVE-2014-3568 12500 (Comware v7) R7328P04 JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JG497A HP 12500 MPU w/Comware V7 OS JG782A HP FF 12508E AC Switch Chassis JG783A HP FF 12508E DC Switch Chassis JG784A HP FF 12518E AC Switch Chassis JG785A HP FF 12518E DC Switch Chassis JG802A HP FF 12500E MPU H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M) H3C 12508 DC Switch Chassis (0235A38L) H3C 12518 DC Switch Chassis (0235A38K) CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 11900 Switch Series R2111P06 JG608A HP FF 11908-V Switch Chassis JG609A HP FF 11900 Main Processing Unit CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 10500 Switch Series (Comware v5) R1208P10 JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC614A HP 10500 Main Processing Unit JC748A HP 10512 Switch Chassis JG375A HP 10500 TAA Main Processing Unit JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis CVE-2014-3566 CVE-2014-3568 10500 Switch Series (Comware v7) R2111P06 JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC748A HP 10512 Switch Chassis JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis JG496A HP 10500 Type A MPU w/Comware v7 OS CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 9500E R1828P06 JC124A HP A9508 Switch Chassis JC124B HP 9505 Switch Chassis JC125A HP A9512 Switch Chassis JC125B HP 9512 Switch Chassis JC474A HP A9508-V Switch Chassis JC474B HP 9508-V Switch Chassis H3C S9505E Routing-Switch Chassis (0235A0G6) H3C S9512E Routing-Switch Chassis (0235A0G7) H3C S9508E-V Routing-Switch Chassis (0235A38Q) H3C S9505E Chassis w/ Fans (0235A38P) H3C S9512E Chassis w/ Fans (0235A38R) CVE-2014-3566 CVE-2014-3568 7900 R2122 JG682A HP FlexFabric 7904 Switch Chassis JH001A HP FF 7910 2.4Tbps Fabric / MPU JG842A HP FF 7910 7.2Tbps Fabric / MPU JG841A HP FF 7910 Switch Chassis CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 7500 Switch Series R6708P10 JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T JC697A HP A7502 TAA Main Processing Unit JC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE JC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE JC700A HP A7500 384 Gbps TAA Fabric / MPU JC701A HP A7510 768 Gbps TAA Fabric / MPU JD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports JD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports JD194A HP 384 Gbps Fabric A7500 Module JD194B HP 7500 384Gbps Fabric Module JD195A HP 7500 384Gbps Advanced Fabric Module JD196A HP 7502 Fabric Module JD220A HP 7500 768Gbps Fabric Module JD238A HP A7510 Switch Chassis JD238B HP 7510 Switch Chassis JD239A HP A7506 Switch Chassis JD239B HP 7506 Switch Chassis JD240A HP A7503 Switch Chassis JD240B HP 7503 Switch Chassis JD241A HP A7506 Vertical Switch Chassis JD241B HP 7506-V Switch Chassis JD242A HP A7502 Switch Chassis JD242B HP 7502 Switch Chassis JD243A HP A7503 Switch Chassis w/1 Fabric Slot JD243B HP 7503-S Switch Chassis w/1 Fabric Slot H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4) H3C S7503E Ethernet Switch Chassis with Fan (0235A0G2) H3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5) H3C S7506E Ethernet Switch Chassis with Fan (0235A0G1) H3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3) H3C S7510E Ethernet Switch Chassis with Fan (0235A0G0) H3C S7502E Chassis w/ fans (0235A29A) H3C S7503E Chassis w/ fans (0235A27R) H3C S7503E-S Chassis w/ fans (0235A33R) H3C S7506E Chassis w/ fans (0235A27Q) H3C S7506E-V Chassis w/ fans (0235A27S) CVE-2014-3566 CVE-2014-3568 HSR6800 R3303P18 JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU CVE-2014-3566 CVE-2014-3568 HSR6800 Russian Version R3303P18 JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU CVE-2014-3566 CVE-2014-3568 HSR6602 R3303P18 JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router JG777A HP HSR6602-XG TAA Router CVE-2014-3566 CVE-2014-3568 HSR6602 Russian Version R3303P18 JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router CVE-2014-3566 CVE-2014-3568 6602 R3303P18 JC176A HP 6602 Router Chassis H3C SR6602 1U Router Host (0235A27D) CVE-2014-3566 CVE-2014-3568 6602 Russian Version R3303P18 JC176A HP 6602 Router Chassis H3C SR6602 1U Router Host (0235A27D) CVE-2014-3566 CVE-2014-3568 A6600 R3303P18 JC165A HP 6600 RPE-X1 Router Module JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR66-RPE-X1-H3 (0231A761) H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D) CVE-2014-3566 CVE-2014-3568 A6600 Russian Version R3303P18 JC165A HP 6600 RPE-X1 Router Module JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR66-RPE-X1-H3 (0231A761) H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D) CVE-2014-3566 CVE-2014-3568 6600 MCP R3303P18 JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D) CVE-2014-3566 CVE-2014-3568 6600 MCP Russian Version R3303P18 JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router JG778A HP 6600 MCP-X2 Router TAA MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D) CVE-2014-3566 CVE-2014-3568 5920 Switch Series R2311P05 JG296A HP 5920AF-24XG Switch JG555A HP 5920AF-24XG TAA Switch CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 5900 Switch Series R2311P05 JC772A HP 5900AF-48XG-4QSFP+ Switch JG336A HP 5900AF-48XGT-4QSFP+ Switch JG510A HP 5900AF-48G-4XG-2QSFP+ Switch JG554A HP 5900AF-48XG-4QSFP+ TAA Switch JG838A HP FF 5900CP-48XG-4QSFP+ Switch CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 5830 Switch Series R1118P11 JC691A HP A5830AF-48G Switch w/1 Interface Slot JC694A HP A5830AF-96G Switch JG316A HP 5830AF-48G TAA Switch w/1 Intf Slot JG374A HP 5830AF-96G TAA Switch CVE-2014-3566 CVE-2014-3568 5820 Switch Series R1809P03 JC102A HP 5820-24XG-SFP+ Switch JC106A HP 5820-14XG-SFP+ Switch with 2 Slots JG219A HP 5820AF-24XG Switch JG243A HP 5820-24XG-SFP+ TAA-compliant Switch JG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media modules Plus OSM (0235A37L) H3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T (RJ45) (0235A370) CVE-2014-3566 CVE-2014-3568 5800 Switch Series R1809P03 JC099A HP 5800-24G-PoE Switch JC100A HP 5800-24G Switch JC101A HP 5800-48G Switch with 2 Slots JC103A HP 5800-24G-SFP Switch JC104A HP 5800-48G-PoE Switch JC105A HP 5800-48G Switch JG225A HP 5800AF-48G Switch JG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots JG254A HP 5800-24G-PoE+ TAA-compliant Switch JG255A HP 5800-24G TAA-compliant Switch JG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt JG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot JG258A HP 5800-48G TAA Switch w 1 Intf Slot H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot (0235A36U) H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X (SFP Plus ) Plus 1 media module PoE (0235A36S) H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus media module (no power) (0235A374) H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus ) Plus media module (0235A379) H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module (0235A378) H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM (0235A36W) CVE-2014-3566 CVE-2014-3568 5700 R2311P05 JG894A HP FF 5700-48G-4XG-2QSFP+ Switch JG895A HP FF 5700-48G-4XG-2QSFP+ TAA Switch JG896A HP FF 5700-40XG-2QSFP+ Switch JG897A HP FF 5700-40XG-2QSFP+ TAA Switch JG898A HP FF 5700-32XGT-8XG-2QSFP+ Switch JG899A HP FF 5700-32XGT-8XG-2QSFP+ TAA Switch CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 5500 HI Switch Series R5501P06 JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch JG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch JG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt JG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt JG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt JG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt JG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt JG681A HP 5500-24G-SFP HI TAA Swch w/2Slt CVE-2014-3566 CVE-2014-3568 5500 EI Switch Series R2221P08 JD373A HP 5500-24G DC EI Switch JD374A HP 5500-24G-SFP EI Switch JD375A HP 5500-48G EI Switch JD376A HP 5500-48G-PoE EI Switch JD377A HP 5500-24G EI Switch JD378A HP 5500-24G-PoE EI Switch JD379A HP 5500-24G-SFP DC EI Switch JG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts JG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts JG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts JG250A HP 5500-24G EI TAA Switch w 2 Intf Slts JG251A HP 5500-48G EI TAA Switch w 2 Intf Slts JG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts JG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts H3C S5500-28C-EI Ethernet Switch (0235A253) H3C S5500-28F-EI Eth Switch AC Single (0235A24U) H3C S5500-52C-EI Ethernet Switch (0235A24X) H3C S5500-28C-EI-DC Ethernet Switch (0235A24S) H3C S5500-28C-PWR-EI Ethernet Switch (0235A255) H3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259) H3C S5500-52C-PWR-EI Ethernet Switch (0235A251) CVE-2014-3566 CVE-2014-3568 5500 SI Switch Series R2221P08 JD369A HP 5500-24G SI Switch JD370A HP 5500-48G SI Switch JD371A HP 5500-24G-PoE SI Switch JD372A HP 5500-48G-PoE SI Switch JG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts JG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts H3C S5500-28C-SI Ethernet Switch (0235A04U) H3C S5500-52C-SI Ethernet Switch (0235A04V) H3C S5500-28C-PWR-SI Ethernet Switch (0235A05H) H3C S5500-52C-PWR-SI Ethernet Switch (0235A05J) CVE-2014-3566 CVE-2014-3568 5130 EI switch Series R3108P03 JG932A HP 5130-24G-4SFP+ EI Switch JG933A HP 5130-24G-SFP-4SFP+ EI Switch JG934A HP 5130-48G-4SFP+ EI Switch JG936A HP 5130-24G-PoE+-4SFP+ EI Swch JG937A HP 5130-48G-PoE+-4SFP+ EI Swch JG975A HP 5130-24G-4SFP+ EI BR Switch JG976A HP 5130-48G-4SFP+ EI BR Switch JG977A HP 5130-24G-PoE+-4SFP+ EI BR Swch JG978A HP 5130-48G-PoE+-4SFP+ EI BR Swch CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 5120 EI Switch Series R2221P08 JE066A HP 5120-24G EI Switch JE067A HP 5120-48G EI Switch JE068A HP 5120-24G EI Switch with 2 Slots JE069A HP 5120-48G EI Switch with 2 Slots JE070A HP 5120-24G-PoE EI Switch with 2 Slots JE071A HP 5120-48G-PoE EI Switch with 2 Slots JG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts JG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts JG245A HP 5120-24G EI TAA Switch w 2 Intf Slts JG246A HP 5120-48G EI TAA Switch w 2 Intf Slts JG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts JG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ) H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS) H3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR) H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT) H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU) H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV) CVE-2014-3566 CVE-2014-3568 5120 SI switch Series R1513P95 JE072A HP 5120-48G SI Switch JE073A HP 5120-16G SI Switch JE074A HP 5120-24G SI Switch JG091A HP 5120-24G-PoE+ (370W) SI Switch JG092A HP 5120-24G-PoE+ (170W) SI Switch H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W) H3C S5120-20P-SI L2 16GE Plus 4SFP (0235A42B) H3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D) H3C S5120-28P-HPWR-SI (0235A0E5) H3C S5120-28P-PWR-SI (0235A0E3) CVE-2014-3566 CVE-2014-3568 4800 G Switch Series R2221P08 JD007A HP 4800-24G Switch JD008A HP 4800-24G-PoE Switch JD009A HP 4800-24G-SFP Switch JD010A HP 4800-48G Switch JD011A HP 4800-48G-PoE Switch 3Com Switch 4800G 24-Port (3CRS48G-24-91) 3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91) 3Com Switch 4800G 48-Port (3CRS48G-48-91) 3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91) 3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91) CVE-2014-3566 CVE-2014-3568 4510G Switch Series R2221P08 JF428A HP 4510-48G Switch JF847A HP 4510-24G Switch 3Com Switch 4510G 48 Port (3CRS45G-48-91) 3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91) 3Com Switch E4510-24G (3CRS45G-24-91) CVE-2014-3566 CVE-2014-3568 4210G Switch Series R2221P08 JF844A HP 4210-24G Switch JF845A HP 4210-48G Switch JF846A HP 4210-24G-PoE Switch 3Com Switch 4210-24G (3CRS42G-24-91) 3Com Switch 4210-48G (3CRS42G-48-91) 3Com Switch E4210-24G-PoE (3CRS42G-24P-91) CVE-2014-3566 CVE-2014-3568 3610 Switch Series R5319P10 JD335A HP 3610-48 Switch JD336A HP 3610-24-4G-SFP Switch JD337A HP 3610-24-2G-2G-SFP Switch JD338A HP 3610-24-SFP Switch H3C S3610-52P - model LS-3610-52P-OVS (0235A22C) H3C S3610-28P - model LS-3610-28P-OVS (0235A22D) H3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E) H3C S3610-28F - model LS-3610-28F-OVS (0235A22F) CVE-2014-3566 CVE-2014-3568 3600 V2 Switch Series R2110P03 JG299A HP 3600-24 v2 EI Switch JG300A HP 3600-48 v2 EI Switch JG301A HP 3600-24-PoE+ v2 EI Switch JG301B HP 3600-24-PoE+ v2 EI Switch JG302A HP 3600-48-PoE+ v2 EI Switch JG302B HP 3600-48-PoE+ v2 EI Switch JG303A HP 3600-24-SFP v2 EI Switch JG304A HP 3600-24 v2 SI Switch JG305A HP 3600-48 v2 SI Switch JG306A HP 3600-24-PoE+ v2 SI Switch JG306B HP 3600-24-PoE+ v2 SI Switch JG307A HP 3600-48-PoE+ v2 SI Switch JG307B HP 3600-48-PoE+ v2 SI Switch CVE-2014-3566 CVE-2014-3568 3100V2 R5203P11 JD313B HP 3100-24-PoE v2 EI Switch JD318B HP 3100-8 v2 EI Switch JD319B HP 3100-16 v2 EI Switch JD320B HP 3100-24 v2 EI Switch JG221A HP 3100-8 v2 SI Switch JG222A HP 3100-16 v2 SI Switch JG223A HP 3100-24 v2 SI Switch CVE-2014-3566 CVE-2014-3568 3100V2-48 R2110P03 JG315A HP 3100-48 v2 Switch CVE-2014-3566 CVE-2014-3568 1920 R1105 JG920A HP 1920-8G Switch JG921A HP 1920-8G-PoE+ (65W) Switch JG922A HP 1920-8G-PoE+ (180W) Switch JG923A HP 1920-16G Switch JG924A HP 1920-24G Switch JG925A HP 1920-24G-PoE+ (180W) Switch JG926A HP 1920-24G-PoE+ (370W) Switch JG927A HP 1920-48G Switch CVE-2014-3566 CVE-2014-3568 1910 R11XX R1107 JG536A HP 1910-8 Switch JG537A HP 1910-8 -PoE+ Switch JG538A HP 1910-24 Switch JG539A HP 1910-24-PoE+ Switch JG540A HP 1910-48 Switch CVE-2014-3566 CVE-2014-3568 1910 R15XX R1513P95 JE005A HP 1910-16G Switch JE006A HP 1910-24G Switch JE007A HP 1910-24G-PoE (365W) Switch JE008A HP 1910-24G-PoE(170W) Switch JE009A HP 1910-48G Switch JG348A HP 1910-8G Switch JG349A HP 1910-8G-PoE+ (65W) Switch JG350A HP 1910-8G-PoE+ (180W) Switch CVE-2014-3566 CVE-2014-3568 1620 R1104 JG912A HP 1620-8G Switch JG913A HP 1620-24G Switch JG914A HP 1620-48G Switch CVE-2014-3566 CVE-2014-3568 MSR20-1X R2513P33 JD431A HP MSR20-10 Router JD667A HP MSR20-15 IW Multi-Service Router JD668A HP MSR20-13 Multi-Service Router JD669A HP MSR20-13 W Multi-Service Router JD670A HP MSR20-15 A Multi-Service Router JD671A HP MSR20-15 AW Multi-Service Router JD672A HP MSR20-15 I Multi-Service Router JD673A HP MSR20-11 Multi-Service Router JD674A HP MSR20-12 Multi-Service Router JD675A HP MSR20-12 W Multi-Service Router JD676A HP MSR20-12 T1 Multi-Service Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router JG209A HP MSR20-12-T-W Router (NA) JG210A HP MSR20-13-W Router (NA) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8) H3C MSR 20-10 (0235A0A7) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-11 (0235A31V) H3C MSR 20-12 (0235A32E) H3C MSR 20-12 T1 (0235A32B) H3C MSR 20-13 (0235A31W) H3C MSR 20-13 W (0235A31X) H3C MSR 20-15 A (0235A31Q) H3C MSR 20-15 A W (0235A31R) H3C MSR 20-15 I (0235A31N) H3C MSR 20-15 IW (0235A31P) H3C MSR20-12 W (0235A32G) CVE-2014-3566 CVE-2014-3568 MSR30 R2513P33 JD654A HP MSR30-60 POE Multi-Service Router JD657A HP MSR30-40 Multi-Service Router JD658A HP MSR30-60 Multi-Service Router JD660A HP MSR30-20 POE Multi-Service Router JD661A HP MSR30-40 POE Multi-Service Router JD666A HP MSR30-20 Multi-Service Router JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF232A HP RT-MSR3040-AC-OVS-AS-H3 JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S) H3C MSR 30-20 (0235A19L) H3C MSR 30-20 POE (0235A239) H3C MSR 30-40 (0235A20J) H3C MSR 30-40 POE (0235A25R) H3C MSR 30-60 (0235A20K) H3C MSR 30-60 POE (0235A25S) H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V) CVE-2014-3566 CVE-2014-3568 MSR30-16 R2513P33 JD659A HP MSR30-16 POE Multi-Service Router JD665A HP MSR30-16 Multi-Service Router JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321) H3C MSR 30-16 (0235A237) H3C MSR 30-16 POE (0235A238) CVE-2014-3566 CVE-2014-3568 MSR30-1X R2513P33 JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H) H3C RT-MSR3011-AC-OVS-H3 (0235A29L) CVE-2014-3566 CVE-2014-3568 MSR50 R2513P33 JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR5040-DC-OVS-H3C (0235A20P) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L) CVE-2014-3566 CVE-2014-3568 MSR50-G2 R2513P33 JD429A HP MSR50 G2 Processor Module JD429B HP MSR50 G2 Processor Module H3C H3C MSR 50 Processor Module-G2 (0231A84Q) H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD(0231A0KL) CVE-2014-3566 CVE-2014-3568 MSR20 Russian version MSR201X_5.20.R2513L40.RU JD663B HP MSR20-21 Router JF228A HP MSR20-40 Router JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324) H3C RT-MSR2040-AC-OVS-H3 (0235A326) CVE-2014-3566 CVE-2014-3568 MSR20-1X Russian version MSR201X_5.20.R2513L40.RU JD431A HP MSR20-10 Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router H3C MSR 20-10 (0235A0A7) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8) CVE-2014-3566 CVE-2014-3568 MSR30 Russian version MSR201X_5.20.R2513L40.RU JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296) CVE-2014-3566 CVE-2014-3568 MSR30-16 Russian version MSR201X_5.20.R2513L40.RU JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321) CVE-2014-3566 CVE-2014-3568 MSR30-1X Russian version MSR201X_5.20.R2513L40.RU JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C RT-MSR3011-AC-OVS-H3 (0235A29L) H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H) CVE-2014-3566 CVE-2014-3568 MSR50 Russian version MSR201X_5.20.R2513L40.RU JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR 50 Processor Module (0231A791) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR5040-DC-OVS-H3C (0235A20P) CVE-2014-3566 CVE-2014-3568 MSR50 G2 Russian version MSR201X_5.20.R2513L40.RU JD429B HP MSR50 G2 Processor Module H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD (0231A0KL) CVE-2014-3566 CVE-2014-3568 MSR9XX R2513P33 JF812A HP MSR900 Router JF813A HP MSR920 Router JF814A HP MSR900-W Router JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr JG207A HP MSR900-W Router (NA) JG208A HP MSR920-W Router (NA) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2) H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX) H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4) H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0) CVE-2014-3566 CVE-2014-3568 MSR93X R2513P33 JG512A HP MSR930 Wireless Router JG513A HP MSR930 3G Router JG514A HP MSR931 Router JG515A HP MSR931 3G Router JG516A HP MSR933 Router JG517A HP MSR933 3G Router JG518A HP MSR935 Router JG519A HP MSR935 Wireless Router JG520A HP MSR935 3G Router JG531A HP MSR931 Dual 3G Router JG596A HP MSR930 4G LTE/3G CDMA Router JG597A HP MSR936 Wireless Router JG665A HP MSR930 4G LTE/3G WCDMA Global Router JG704A HP MSR930 4G LTE/3G WCDMA ATT Router CVE-2014-3566 CVE-2014-3568 MSR1000 R2513P33 JG732A HP MSR1003-8 AC Router CVE-2014-3566 CVE-2014-3568 MSR1000 Russian version R2513L40.RU JG732A HP MSR1003-8 AC Router CVE-2014-3566 CVE-2014-3568 MSR2000 R0106P18 JG411A HP MSR2003 AC Router CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 MSR3000 R0106P18 JG404A HP MSR3064 Router JG405A HP MSR3044 Router JG406A HP MSR3024 AC Router JG409A HP MSR3012 AC Router JG861A HP MSR3024 TAA-compliant AC Router CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 MSR4000 R0106P18 JG402A HP MSR4080 Router Chassis JG403A HP MSR4060 Router Chassis JG412A HP MSR4000 MPU-100 Main Processing Unit CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 F5000 F3210P22 JG216A HP F5000 Firewall Standalone Chassis JD259A HP A5000-A5 VPN Firewall Chassis H3C SecPath F5000-A5 Host System (0150A0AG) CVE-2014-3566 CVE-2014-3568 F5000-C R3811P03 JG650A HP F5000-C VPN Firewall Appliance CVE-2014-3566 CVE-2014-3568 F5000-S R3811P03 JG370A HP F5000-S VPN Firewall Appliance CVE-2014-3566 CVE-2014-3568 U200S and CS F5123P30 JD268A HP 200-CS UTM Appliance JD273A HP U200-S UTM Appliance H3C SecPath U200-S (0235A36N) CVE-2014-3566 CVE-2014-3568 U200A and M F5123P30 JD274A HP 200-M UTM Appliance JD275A HP U200-A UTM Appliance H3C SecPath U200-A (0235A36Q) CVE-2014-3566 CVE-2014-3568 SecBlade III R3820P03 JG371A HP 12500 20Gbps VPN Firewall Module JG372A HP 10500/11900/7500 20Gbps VPN FW Mod CVE-2014-3566 CVE-2014-3568 SecBlade FW R3181P05 JC635A HP 12500 VPN Firewall Module JD245A HP 9500 VPN Firewall Module JD249A HP 10500/7500 Advanced VPN Firewall Mod JD250A HP 6600 Firewall Processing Rtr Module JD251A HP 8800 Firewall Processing Module JD255A HP 5820 VPN Firewall Module H3C S9500E SecBlade VPN Firewall Module (0231A0AV) H3C S7500E SecBlade VPN Firewall Module (0231A832) H3C SR66 Gigabit Firewall Module (0231A88A) H3C SR88 Firewall Processing Module (0231A88L) H3C S5820 SecBlade VPN Firewall Module (0231A94J) CVE-2014-3566 CVE-2014-3568 F1000-E R3181P05 JD272A HP F1000-E VPN Firewall Appliance CVE-2014-3566 CVE-2014-3568 F1000-A R3734P06 JG214A HP F1000-A-EI VPN Firewall Appliance CVE-2014-3566 CVE-2014-3568 F1000-S R3734P06 JG213A HP F1000-S-EI VPN Firewall Appliance CVE-2014-3566 CVE-2014-3568 SecBlade SSL VPN Fix in Progress Use Mitigation JD253A HP 10500/7500 SSL VPN Mod w 500-user Lic CVE-2014-3566 CVE-2014-3568 VSR1000 R0204P01 JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software JG811AAE HP VSR1001 Comware 7 Virtual Services Router JG812AAE HP VSR1004 Comware 7 Virtual Services Router JG813AAE HP VSR1008 Comware 7 Virtual Services Router CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 WX5002/5004 R2507P34 JD441A HP 5800 ACM for 64-256 APs JD447B HP WX5002 Access Controller JD448A HP A-WX5004 Access Controller JD448B HP WX5004 Access Controller JD469A HP A-WX5004 (3Com) Access Controller JG261A HP 5800 Access Controller OAA TAA Mod CVE-2014-3566 CVE-2014-3568 HP 850/870 R2607P34 JG723A HP 870 Unified Wired-WLAN Appliance JG725A HP 870 Unifd Wrd-WLAN TAA Applnc JG722A HP 850 Unified Wired-WLAN Appliance JG724A HP 850 Unifd Wrd-WLAN TAA Applnc CVE-2014-3566 CVE-2014-3568 HP 830 R3507P34 JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch JG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch JG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch JG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch CVE-2014-3566 CVE-2014-3568 HP 6000 R2507P34 JG639A HP 10500/7500 20G Unified Wired-WLAN Mod JG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod CVE-2014-3566 CVE-2014-3568 VCX Fix in Progress Use Mitigation J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr JC517A HP VCX V7205 Platform w/DL 360 G6 Server JE355A HP VCX V6000 Branch Platform 9.0 JC516A HP VCX V7005 Platform w/DL 120 G6 Server JC518A HP VCX Connect 200 Primry 120 G6 Server J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr JE341A HP VCX Connect 100 Secondary JE252A HP VCX Connect Primary MIM Module JE253A HP VCX Connect Secondary MIM Module JE254A HP VCX Branch MIM Module JE355A HP VCX V6000 Branch Platform 9.0 JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod JD023A HP MSR30-40 Router with VCX MIM Module JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS JE340A HP VCX Connect 100 Pri Server 9.0 JE342A HP VCX Connect 100 Sec Server 9.0 CVE-2014-3566 CVE-2014-3568 iMC PLAT iMC PLAT v7.1 E0303P06 JD125A HP IMC Std S/W Platform w/100-node JD126A HP IMC Ent S/W Platform w/100-node JD808A HP IMC Ent Platform w/100-node License JD815A HP IMC Std Platform w/100-node License JF377A HP IMC Std S/W Platform w/100-node Lic JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU JF378A HP IMC Ent S/W Platform w/200-node Lic JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU JG546AAE HP IMC Basic SW Platform w/50-node E-LTU JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU JG659AAE HP IMC Smart Connect VAE E-LTU JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU CVE-2014-3566 iMC UAM iMC UAM v7.1 E0302P07 JD144A HP IMC UAM S/W Module w/200-User License JF388A HP IMC UAM S/W Module w/200-user License JF388AAE HP IMC UAM S/W Module w/200-user E-LTU JG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 iMC WSM Fix in Progress Use Mitigation JD456A HP WSM Plug-in for IMC Includes 50 Aps JF414A HP IMC WSM S/W Module with 50-AP License JF414AAE HP IMC WSM S/W Module with 50-AP E-LTU JG551AAE HP PMM to IMC WSM Upgr w/250 AP E-LTU JG769AAE HP PMM to IMC WSM Upg w/ 250-node E-LTU CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 A Fixes in progress use mitigations J9565A HP 2615-8-PoE Switch J9562A HP 2915-8G-PoE Switch E Fixes in progress use mitigations J4850A HP ProCurve Switch 5304xl J8166A HP ProCurve Switch 5304xl-32G J4819A HP ProCurve Switch 5308xl J8167A HP ProCurve Switch 5308xl-48G J4849A HP ProCurve Switch 5348xl J4849B HP ProCurve Switch 5348xl J4848A HP ProCurve Switch 5372xl J4848B HP ProCurve Switch 5372xl F Fixes in progress use mitigations J4812A HP ProCurve 2512 Switch J4813A HP ProCurve 2524 Switch J4817A HP ProCurve 2312 Switch J4818A HP ProCurve 2324 Switch H.07 Fixes in progress use mitigations J4902A HP ProCurve 6108 Switch H.10 Fixes in progress use mitigations J8762A HP E2600-8-PoE Switch J4900A HP PROCURVE SWITCH 2626 J4900B HP ProCurve Switch 2626 J4900C ProCurve Switch 2626 J4899A HP ProCurve Switch 2650 J4899B HP ProCurve Switch 2650 J4899C ProCurve Switch 2650 J8164A ProCurve Switch 2626-PWR J8165A HP ProCurve Switch 2650-PWR i.10 Fixes in progress use mitigations J4903A ProCurve Switch 2824 J4904A HP ProCurve Switch 2848 J Fixes in progress use mitigations J9299A HP 2520-24G-PoE Switch J9298A HP 2520-8G-PoE Switch K Fixes in progress use mitigations J8692A HP 3500-24G-PoE yl Switch J8693A HP 3500-48G-PoE yl Switch J9310A HP 3500-24G-PoE+ yl Switch J9311A HP 3500-48G-PoE+ yl Switch J9470A HP 3500-24 Switch J9471A HP 3500-24-PoE Switch J9472A HP 3500-48 Switch J9473A HP 3500-48-PoE Switch J8697A HP E5406 zl Switch Chassis J8699A HP 5406-48G zl Switch J9447A HP 5406-44G-PoE+-4SFP zl Switch J9533A HP 5406-44G-PoE+-2XG v2 zl Swch w Pm SW J9539A HP 5406-44G-PoE+-4G v2 zl Swch w Prm SW J9642A HP 5406 zl Switch with Premium Software J9866A HP 5406 8p10GT 8p10GE Swch and Psw J8698A HP E5412 zl Switch Chassis J8700A HP 5412-96G zl Switch J9448A HP 5412-92G-PoE+-4SFP zl Switch J9532A HP 5412-92G-PoE+-2XG v2 zl Swch w Pm SW J9540A HP 5412-92G-PoE+-4G v2 zl Swch w Prm SW J9643A HP 5412 zl Switch with Premium Software J8992A HP 6200-24G-mGBIC yl Switch J9263A HP E6600-24G Switch J9264A HP 6600-24G-4XG Switch J9265A HP 6600-24XG Switch J9451A HP E6600-48G Switch J9452A HP 6600-48G-4XG Switch J9475A HP E8206 zl Switch Base System J9638A HP 8206-44G-PoE+-2XG v2 zl Swch w Pm SW J9640A HP 8206 zl Switch w/Premium Software J8715A ProCurve Switch 8212zl Base System J8715B HP E8212 zl Switch Base System J9091A ProCurve Switch 8212zl Chassis&Fan Tray J9639A HP 8212-92G-PoE+-2XG v2 zl Swch w Pm SW J9641A HP 8212 zl Switch with Premium SW KA Fixes in progress use mitigations J9573A HP 3800-24G-PoE+-2SFP+ Switch J9574A HP 3800-48G-PoE+-4SFP+ Switch J9575A HP 3800-24G-2SFP+ Switch J9576A HP 3800-48G-4SFP+ Switch J9584A HP 3800-24SFP-2SFP+ Switch J9585A HP 3800-24G-2XG Switch J9586A HP 3800-48G-4XG Switch J9587A HP 3800-24G-PoE+-2XG Switch J9588A HP 3800-48G-PoE+-4XG Switch KB Fixes in progress use mitigations J9821A HP 5406R zl2 Switch J9822A HP 5412R zl2 Switch J9823A HP 5406R-Gig-T-PoE+/SFP+ v2 zl2 Swch J9824A HP 5406R-Gig-T-PoE+/SFP v2 zl2 Swch J9825A HP 5412R-Gig-T-PoE+/SFP+ v2 zl2 Swch J9826A HP 5412R-Gig-T-PoE+/SFP v2 zl2 Swch J9850A HP 5406R zl2 Switch J9851A HP 5412R zl2 Switch J9868A HP 5406R-8XGT/8SFP+ v2 zl2 Swch L Fixes in progress use mitigations J8772B HP 4202-72 Vl Switch J8770A HP 4204 Vl Switch Chassis J9064A HP 4204-44G-4SFP Vl Switch J8773A HP 4208 Vl Switch Chassis J9030A HP 4208-68G-4SFP Vl Switch J8775B HP 4208-96 Vl Switch J8771A ProCurve Switch 4202VL-48G J8772A ProCurve Switch 4202VL-72 J8774A ProCurve Switch 4208VL-64G J8775A ProCurve Switch 4208VL-96 M.08 Fixes in progress use mitigations J8433A HP 6400-6XG cl Switch J8474A HP 6410-6XG cl Switch M.10 Fixes in progress use mitigations J4906A HP E3400-48G cl Switch J4905A HP ProCurve Switch 3400cl-24G N Fixes in progress use mitigations J9021A HP 2810-24G Switch J9022A HP 2810-48G Switch PA Fixes in progress use mitigations J9029A ProCurve Switch 1800-8G PB Fixes in progress use mitigations J9028A ProCurve Switch 1800-24G J9028B ProCurve Switch 1800-24G Q Fixes in progress use mitigations J9019B HP 2510-24 Switch J9019A ProCurve Switch 2510-24 R Fixes in progress use mitigations J9085A HP 2610-24 Switch J9087A HP 2610-24-PoE Switch J9086A HP 2610-24-PPoE Switch J9088A HP 2610-48 Switch J9089A HP 2610-48-PoE Switch RA Fixes in progress use mitigations J9623A HP 2620-24 Switch J9624A HP 2620-24-PPoE+ Switch J9625A HP 2620-24-PoE+ Switch J9626A HP 2620-48 Switch J9627A HP 2620-48-PoE+ Switch S Fixes in progress use mitigations J9138A HP 2520-24-PoE Switch J9137A HP 2520-8-PoE Switch T Fixes in progress use mitigations J9049A ProCurve Switch 2900- 24G J9050A ProCurve Switch 2900 48G U Fixes in progress use mitigations J9020A HP 2510-48 Switch VA Fixes in progress use mitigations J9079A HP 1700-8 Switch VB Fixes in progress use mitigations J9080A HP 1700-24 Switch W Fixes in progress use mitigations J9145A HP 2910-24G al Switch J9146A HP 2910-24G-PoE+ al Switch J9147A HP 2910-48G al Switch J9148A HP 2910-48G-PoE+ al Switch WB Fixes in progress use mitigations J9726A HP 2920-24G Switch J9727A HP 2920-24G-POE+ Switch J9728A HP 2920-48G Switch J9729A HP 2920-48G-POE+ Switch J9836A HP 2920-48G-POE+ 740W Switch Y Fixes in progress use mitigations J9279A HP 2510-24G Switch J9280A HP 2510-48G Switch YA Fixes in progress use mitigations J9772A HP 2530-48G-PoE+ Switch J9773A HP 2530-24G-PoE+ Switch J9774A HP 2530-8G-PoE+ Switch J9775A HP 2530-48G Switch J9776A HP 2530-24G Switch J9777A HP 2530-8G Switch J9778A HP 2530-48-PoE+ Switch J9781A HP 2530-48 Switch J9853A HP 2530-48G-PoE+-2SFP+ Switch J9854A HP 2530-24G-PoE+-2SFP+ Switch J9855A HP 2530-48G-2SFP+ Switch J9856A HP 2530-24G-2SFP+ Switch YB Fixes in progress use mitigations J9779A HP 2530-24-PoE+ Switch J9780A HP 2530-8-PoE+ Switch J9782A HP 2530-24 Switch J9783A HP 2530-8 Switch MSM 6.5 6.5.1.0 J9420A HP MSM760 Premium Mobility Controller J9421A HP MSM760 Access Controller J9370A HP MSM765 Zl Premium Mobility Controller J9693A HP MSM720 Access Controller (WW) J9694A HP MSM720 Premium Mobility Cntlr (WW) J9695A HP MSM720 TAA Access Controller J9696A HP MSM720 TAA Premium Mobility Cntlr J9840A HP MSM775 zl Premium Controller Module J9845A HP 560 Wireless 802.11ac (AM) AP J9846A HP 560 Wireless 802.11ac (WW) AP J9847A HP 560 Wireless 802.11ac (JP) AP J9848A HP 560 Wireless 802.11ac (IL) AP J9358A HP E-MSM422 Access Point (US) J9358B HP MSM422 Access Point (US) J9359A HP E-MSM422 Access Point (WW) J9359B HP MSM422 Access Point (WW) J9530A HP E-MSM422 Access Point (JP) J9530B HP MSM422 Access Point (JP) J9617A HP MSM422 Dual Radio 802.11n AP (IL) J9426A HP E-MSM410 Access Point (US) J9426B HP MSM410 Access Point (US) J9427A HP E-MSM410 Access Point (WW) J9427B HP MSM410 Access Point (WW) J9427C HP MSM410 Access Point (WW) J9529A HP E-MSM410 Access Point (JP) J9529B HP MSM410 Access Point (JP) J9589A HP MSM460 Dual Radio 802.11n AP (JP) J9590A HP MSM460 Dual Radio 802.11n AP (AM) J9591A HP MSM460 Dual Radio 802.11n AP (WW) J9616A HP MSM410 Single Radio 802.11n AP (IL) J9618A HP MSM460 Dual Radio 802.11n AP (IL) J9619A HP MSM466 Dual Radio 802.11n AP (IL) J9620A HP MSM466 Dual Radio 802.11n AP (JP) J9621A HP MSM466 Dual Radio 802.11n AP (AM) J9622A HP MSM466 Dual Radio 802.11n AP (WW) J9650A HP MSM430 Dual Radio 802.11n AP (AM) J9651A HP MSM430 Dual Radio 802.11n AP (WW) J9652A HP MSM430 Dual Radio 802.11n AP (JP) J9653A HP MSM430 Dual Radio 802.11n AP (IL) J9654A HP MSM430 Dual Radio 802.11n TAA AP J9655A HP MSM460 Dual Radio 802.11n TAA AP J9656A HP MSM466 Dual Radio 802.11n TAA AP J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM) J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW) J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP) J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL) MSM 6.4 6.4.2.1 J9840A HP MSM775 zl Premium Controller Module J9370A HP MSM765 Zl Premium Mobility Controller J9420A HP MSM760 Premium Mobility Controller J9421A HP MSM760 Access Controller J9693A HP MSM720 Access Controller (WW) J9694A HP MSM720 Premium Mobility Cntlr (WW) J9695A HP MSM720 TAA Access Controller J9696A HP MSM720 TAA Premium Mobility Cntlr J9426A HP E-MSM410 Access Point (US) J9426B HP MSM410 Access Point (US) J9427A HP E-MSM410 Access Point (WW) J9427B HP MSM410 Access Point (WW) J9427C HP MSM410 Access Point (WW) J9529A HP E-MSM410 Access Point (JP) J9529B HP MSM410 Access Point (JP) J9589A HP MSM460 Dual Radio 802.11n AP (JP) J9590A HP MSM460 Dual Radio 802.11n AP (AM) J9591A HP MSM460 Dual Radio 802.11n AP (WW) J9616A HP MSM410 Single Radio 802.11n AP (IL) J9618A HP MSM460 Dual Radio 802.11n AP (IL) J9619A HP MSM466 Dual Radio 802.11n AP (IL) J9620A HP MSM466 Dual Radio 802.11n AP (JP) J9621A HP MSM466 Dual Radio 802.11n AP (AM) J9622A HP MSM466 Dual Radio 802.11n AP (WW) J9650A HP MSM430 Dual Radio 802.11n AP (AM) J9651A HP MSM430 Dual Radio 802.11n AP (WW) J9652A HP MSM430 Dual Radio 802.11n AP (JP) J9653A HP MSM430 Dual Radio 802.11n AP (IL) J9654A HP MSM430 Dual Radio 802.11n TAA AP J9655A HP MSM460 Dual Radio 802.11n TAA AP J9656A HP MSM466 Dual Radio 802.11n TAA AP J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM) J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW) J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP) J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL) J9358A HP E-MSM422 Access Point (US) J9358B HP MSM422 Access Point (US) J9359A HP E-MSM422 Access Point (WW) J9359B HP MSM422 Access Point (WW) J9530A HP E-MSM422 Access Point (JP) J9530B HP MSM422 Access Point (JP) J9617A HP MSM422 Dual Radio 802.11n AP (IL) MSM 6.3 6.3.1.0 J9529B HP MSM410 Access Point (JP) J9589A HP MSM460 Dual Radio 802.11n AP (JP) J9590A HP MSM460 Dual Radio 802.11n AP (AM) J9591A HP MSM460 Dual Radio 802.11n AP (WW) J9616A HP MSM410 Single Radio 802.11n AP (IL) J9618A HP MSM460 Dual Radio 802.11n AP (IL) J9619A HP MSM466 Dual Radio 802.11n AP (IL) J9620A HP MSM466 Dual Radio 802.11n AP (JP) J9621A HP MSM466 Dual Radio 802.11n AP (AM) J9622A HP MSM466 Dual Radio 802.11n AP (WW) J9650A HP MSM430 Dual Radio 802.11n AP (AM) J9651A HP MSM430 Dual Radio 802.11n AP (WW) J9652A HP MSM430 Dual Radio 802.11n AP (JP) J9653A HP MSM430 Dual Radio 802.11n AP (IL) J9654A HP MSM430 Dual Radio 802.11n TAA AP J9655A HP MSM460 Dual Radio 802.11n TAA AP J9656A HP MSM466 Dual Radio 802.11n TAA AP J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM) J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW) J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP) J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL) J9356A HP E-MSM335 Access Point (US) J9356B HP MSM335 Access Point (US) J9357A HP E-MSM335 Access Point (WW) J9357B HP MSM335 Access Point (WW) J9358A HP E-MSM422 Access Point (US) J9358B HP MSM422 Access Point (US) J9359A HP E-MSM422 Access Point (WW) J9359B HP MSM422 Access Point (WW) J9530A HP E-MSM422 Access Point (JP) J9530B HP MSM422 Access Point (JP) J9617A HP MSM422 Dual Radio 802.11n AP (IL) J9360A HP E-MSM320 Access Point (US) J9360B HP MSM320 Access Point (US) J9364A HP E-MSM320 Access Point (WW) J9364B HP MSM320 Access Point (WW) J9365A HP MSM320-R Access Point (US) J9365B HP MSM320-R Access Point (US) J9368A HP E-MSM320-R Access Point (WW) J9368B HP MSM320-R Access Point (WW) J9373A HP E-MSM325 Access Point (WW) J9373B HP MSM325 Access Point (WW) J9374A HP E-MSM310 Access Point (US) J9374B HP MSM310 Access Point (US) J9379A HP MSM310 Access Point (WW) J9379B HP MSM310 Access Point (WW) J9380A HP E-MSM310-R Access Point (US) J9380B HP MSM310-R Access Point (US) J9383A HP E-MSM310-R Access Point (WW) J9383B HP MSM310-R Access Point (WW) J9524A HP E-MSM310 Access Point (JP) J9524B HP MSM310 Access Point (JP) J9527A HP E-MSM320 Access Point (JP) J9527B HP MSM320 Access Point (JP) J9528A HP E-MSM320-R Access Point (JP) J9528B HP MSM320-R Access Point (JP) MSM 6.2 6.2.1.2 J9370A HP MSM765 Zl Premium Mobility Controller J9356A HP E-MSM335 Access Point (US) J9356B HP MSM335 Access Point (US) J9357A HP E-MSM335 Access Point (WW) J9357B HP MSM335 Access Point (WW) J9358A HP E-MSM422 Access Point (US) J9358B HP MSM422 Access Point (US) J9359A HP E-MSM422 Access Point (WW) J9359B HP MSM422 Access Point (WW) J9530A HP E-MSM422 Access Point (JP) J9530B HP MSM422 Access Point (JP) J9617A HP MSM422 Dual Radio 802.11n AP (IL) J9420A HP MSM760 Premium Mobility Controller J9421A HP MSM760 Access Controller J9840A HP MSM775 zl Premium Controller Module J9360A HP E-MSM320 Access Point (US) J9360B HP MSM320 Access Point (US) J9364A HP E-MSM320 Access Point (WW) J9364B HP MSM320 Access Point (WW) J9365A HP MSM320-R Access Point (US) J9365B HP MSM320-R Access Point (US) J9368A HP E-MSM320-R Access Point (WW) J9368B HP MSM320-R Access Point (WW) J9373A HP E-MSM325 Access Point (WW) J9373B HP MSM325 Access Point (WW) J9374A HP E-MSM310 Access Point (US) J9374B HP MSM310 Access Point (US) J9379A HP MSM310 Access Point (WW) J9379B HP MSM310 Access Point (WW) J9380A HP E-MSM310-R Access Point (US) J9380B HP MSM310-R Access Point (US) J9383A HP E-MSM310-R Access Point (WW) J9383B HP MSM310-R Access Point (WW) J9524A HP E-MSM310 Access Point (JP) J9524B HP MSM310 Access Point (JP) J9527A HP E-MSM320 Access Point (JP) J9527B HP MSM320 Access Point (JP) J9528A HP E-MSM320-R Access Point (JP) J9528B HP MSM320-R Access Point (JP) J9426A HP E-MSM410 Access Point (US) J9426B HP MSM410 Access Point (US) J9427A HP E-MSM410 Access Point (WW) J9427B HP MSM410 Access Point (WW) J9427C HP MSM410 Access Point (WW) J9529A HP E-MSM410 Access Point (JP) J9529B HP MSM410 Access Point (JP) J9589A HP MSM460 Dual Radio 802.11n AP (JP) J9590A HP MSM460 Dual Radio 802.11n AP (AM) J9591A HP MSM460 Dual Radio 802.11n AP (WW) J9616A HP MSM410 Single Radio 802.11n AP (IL) J9618A HP MSM460 Dual Radio 802.11n AP (IL) J9619A HP MSM466 Dual Radio 802.11n AP (IL) J9620A HP MSM466 Dual Radio 802.11n AP (JP) J9621A HP MSM466 Dual Radio 802.11n AP (AM) J9622A HP MSM466 Dual Radio 802.11n AP (WW) J9650A HP MSM430 Dual Radio 802.11n AP (AM) J9651A HP MSM430 Dual Radio 802.11n AP (WW) J9652A HP MSM430 Dual Radio 802.11n AP (JP) J9653A HP MSM430 Dual Radio 802.11n AP (IL) J9654A HP MSM430 Dual Radio 802.11n TAA AP J9655A HP MSM460 Dual Radio 802.11n TAA AP J9656A HP MSM466 Dual Radio 802.11n TAA AP J9715A HP E-MSM466-R Dual Radio 802.11n AP (AM) J9716A HP E-MSM466-R Dual Radio 802.11n AP (WW) J9717A HP E-MSM466-R Dual Radio 802.11n AP (JP) J9718A HP E-MSM466-R Dual Radio 802.11n AP (IL) J9693A HP MSM720 Access Controller (WW) J9694A HP MSM720 Premium Mobility Cntlr (WW) J9695A HP MSM720 TAA Access Controller J9696A HP MSM720 TAA Premium Mobility Cntlr M220 Fixes in progress use mitigations J9798A HP M220 802.11n (AM) Access Point J9799A HP M220 802.11n (WW) Access Point M210 Fixes in progress use mitigations JL023A HP M210 802.11n (AM) Access Point JL024A HP M210 802.11n (WW) Access Point PS110 Fixes in progress use mitigations JL065A HP PS110 Wireless 802.11n VPN AM Router JL066A HP PS110 Wireless 802.11n VPN WW Router HP Office Connect 1810 PK Fixes in progress use mitigations J9660A HP 1810-48G Switch HP Office Connect 1810 P Fixes in progress use mitigations J9450A HP 1810-24G Switch J9449A HP 1810-8G Switch HP Office Connect 1810 PL Fixes in progress use mitigations J9802A HP 1810-8G v2 Switch J9803A HP 1810-24G v2 Switch RF Manager Fixes in progress use mitigations J9522A HP E-MSM415 RF Security Sensor J9521A HP RF Manager Controller with 50 Sensor License J9838AAE HP RF Manager for VMware 50 Sensor E-LTU HP Office Connect 1810 PM Fixes in progress use mitigations J9800A HP 1810-8 v2 Switch J9801A HP 1810-24 v2 Switch HP Office Connect PS1810 Fixes in progress use mitigations J9833A HP PS1810-8G Switch J9834A HP PS1810-24G Switch Mitigation Instructions For SSLv3 Server Functionality on Impacted Products: Disable SSLv3 on clients and/or disable CBC ciphers on clients Use Access Control functionality to control client access For SSLv3 Client Functionality on Impacted Products: Go to SSL server and disable SSLv3 and/or disable CBC ciphers Use Access Control functionality to control access to servers HISTORY Version:1 (rev.1) - 2 April 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. References: CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 SSRT101739 SSRT101868 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Existing users may upgrade to HP OneView version 1.20 using the Update Appliance feature in HP OneView. HP OneView version 1.20 is available from the following location: https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =Z7550-63180 Note: The upgrade (.bin) or a new install (.ova) is also available: An HP Passport login is required. Go to the HP Software Depot site at http://www.software.hp.com and search for HP OneView. HISTORY Version:1 (rev.1) - 13 January 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. This issue affects OpenSSL 1.0.1 server implementations for both SSL/TLS and DTLS regardless of whether SRTP is used or configured. Implementations of OpenSSL that have been compiled with OPENSSL_NO_SRTP defined are not affected. This issue was reported to OpenSSL on 26th September 2014, based on an original issue and patch developed by the LibreSSL project. Further analysis of the issue was performed by the OpenSSL team. The fix was developed by the OpenSSL team. Session Ticket Memory Leak (CVE-2014-3567) ========================================== Severity: Medium When an OpenSSL SSL/TLS/DTLS server receives a session ticket the integrity of that ticket is first verified. In the event of a session ticket integrity check failing, OpenSSL will fail to free memory causing a memory leak. This issue was reported to OpenSSL on 8th October 2014. The fix was developed by Stephen Henson of the OpenSSL core team. SSL 3.0 Fallback protection =========================== Severity: Medium OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade. Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE (CVE-2014-3566). https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 https://www.openssl.org/~bodo/ssl-poodle.pdf Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller. Build option no-ssl3 is incomplete (CVE-2014-3568) ================================================== Severity: Low When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014. The fix was developed by Akamai and the OpenSSL team. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv_20141015.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html

Trust: 3.33

sources: NVD: CVE-2014-3513 // JVNDB: JVNDB-2014-004939 // BID: 70586 // BID: 70585 // PACKETSTORM: 132085 // PACKETSTORM: 128793 // PACKETSTORM: 132080 // PACKETSTORM: 137201 // PACKETSTORM: 128708 // PACKETSTORM: 130144 // VULMON: CVE-2014-3513 // PACKETSTORM: 132082 // PACKETSTORM: 131273 // PACKETSTORM: 129932 // PACKETSTORM: 130815 // PACKETSTORM: 169664 // PACKETSTORM: 132467

AFFECTED PRODUCTS

vendor:ibmmodel:flex system chassis management modulescope: - version: -

Trust: 3.3

vendor:ibmmodel:bladecenter advanced management module 3.66nscope:neversion: -

Trust: 1.8

vendor:ibmmodel:bladecenter advanced management module 3.66kscope: - version: -

Trust: 1.8

vendor:ibmmodel:flex system chassis management modulescope:eqversion:1.50.1

Trust: 1.8

vendor:ibmmodel:global console managerscope:neversion:1.26.1.23978

Trust: 1.2

vendor:ibmmodel:global console managerscope:eqversion:1.4.2.15036

Trust: 1.2

vendor:ibmmodel:global console managerscope:eqversion:1.20.20.23447

Trust: 1.2

vendor:opensslmodel:project openssl 1.0.0ascope: - version: -

Trust: 1.2

vendor:ibmmodel:local console managerscope:eqversion:1.2.39.0

Trust: 1.2

vendor:ibmmodel:local console managerscope:eqversion:1.2.27.00

Trust: 1.2

vendor:ibmmodel:local console managerscope:neversion:1.2.40.00

Trust: 1.2

vendor:ibmmodel:flex system chassis management module 1.1.1scope: - version: -

Trust: 1.2

vendor:opensslmodel:opensslscope:eqversion:1.0.1a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1e

Trust: 1.0

vendor:applemodel:xcodescope:eqversion:7.0

Trust: 0.8

vendor:applemodel:xcodescope:ltversion:(os x yosemite v10.10.4 or later )

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:1.0.1j

Trust: 0.8

vendor:opensslmodel:opensslscope:ltversion:1.0.1

Trust: 0.8

vendor:ibmmodel:cognos controllerscope:eqversion:8.5.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-05scope:eqversion:4.6.1

Trust: 0.6

vendor:avayamodel:aura collaboration environmentscope:eqversion:3.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108-v2scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:upward integration modules for vmware vspherescope:eqversion:3.5

Trust: 0.6

vendor:ibmmodel:rational software architect realtime editionscope:eqversion:9.1.1

Trust: 0.6

vendor:ibmmodel:bladecenter advanced management module 25r5778scope: - version: -

Trust: 0.6

vendor:hpmodel:qscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208-v2scope:eqversion:4.6

Trust: 0.6

vendor:ibmmodel:bladecenter -sscope:eqversion:1948

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san pass-thruscope:eqversion:9.1.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004scope:eqversion:4.4

Trust: 0.6

vendor:hpmodel:kscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:upward integration modules scvmm add-inscope:neversion:1.0.3

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.0

Trust: 0.6

vendor:hpmodel:system management homepagescope:neversion:7.4.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108scope:eqversion:4.5

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0dscope: - version: -

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.4

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1escope: - version: -

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008scope:eqversion:4.5

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.2.2

Trust: 0.6

vendor:opensslmodel:project openssl beta3scope:eqversion:1.0.1

Trust: 0.6

vendor:vmwaremodel:vcenter serverscope:eqversion:5.1

Trust: 0.6

vendor:hpmodel:insight controlscope:eqversion:7.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108-v2scope:eqversion:4.6.1

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1ascope: - version: -

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.1.0

Trust: 0.6

vendor:asperasoftmodel:aspera sharesscope:eqversion:1.7.5

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.0.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108scope:eqversion:4.4

Trust: 0.6

vendor:opensslmodel:project openssl kscope:eqversion:0.9.8

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx3002scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.2.0.0

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0gscope: - version: -

Trust: 0.6

vendor:ibmmodel:tivoli netcool/reporterscope:eqversion:2.2

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.5

Trust: 0.6

vendor:hpmodel:insight control server provisioningscope:neversion:7.5.1

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.3.1

Trust: 0.6

vendor:citrixmodel:netscaler t1scope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8zbscope: - version: -

Trust: 0.6

vendor:vmwaremodel:esxiscope:eqversion:5.1

Trust: 0.6

vendor:hpmodel:jscope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1jscope:neversion: -

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.2.2

Trust: 0.6

vendor:ibmmodel:upward integration modules for vmware vspherescope:eqversion:3.0.1

Trust: 0.6

vendor:hpmodel:wbscope:eqversion:0

Trust: 0.6

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:2.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412scope:eqversion:4.6

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.2.3

Trust: 0.6

vendor:ibmmodel:image construction and composition toolscope:eqversion:2.3.1.0

Trust: 0.6

vendor:hpmodel:nscope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0oscope:neversion: -

Trust: 0.6

vendor:hpmodel:pascope:eqversion:0

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.3

Trust: 0.6

vendor:hpmodel:m210scope:eqversion:0

Trust: 0.6

vendor:hpmodel:version control agentscope:eqversion:7.2

Trust: 0.6

vendor:hpmodel:vsr1000scope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8wscope: - version: -

Trust: 0.6

vendor:ibmmodel:cognos tm1scope:eqversion:9.5.2

Trust: 0.6

vendor:hpmodel:switch seriesscope:eqversion:119000

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san switchscope:eqversion:9.1

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.5.4

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1.0

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0mscope: - version: -

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3.1

Trust: 0.6

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.1

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1gscope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8mscope: - version: -

Trust: 0.6

vendor:opensslmodel:project openssl jscope:eqversion:0.9.8

Trust: 0.6

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004scope:eqversion:4.6

Trust: 0.6

vendor:ibmmodel:security virtual server protection for vmwarescope:eqversion:1.1.0.1

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.2.1

Trust: 0.6

vendor:citrixmodel:command center appliancescope:eqversion:0

Trust: 0.6

vendor:asperasoftmodel:aspera sharesscope:eqversion:1.0.1

Trust: 0.6

vendor:ibmmodel:bladecenter -tscope:eqversion:8720

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.23

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.0.2

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.2.1

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.2.4

Trust: 0.6

vendor:avayamodel:aura communication managerscope:eqversion:6.2

Trust: 0.6

vendor:citrixmodel:netscaler gatewayscope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1iscope: - version: -

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.2

Trust: 0.6

vendor:hpmodel:r2122scope:neversion:7900

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.0

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0hscope: - version: -

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx3002scope:eqversion:4.5

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.1.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108scope:eqversion:4.6

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:1.0

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.0.0

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.1.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008-v2scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008scope:eqversion:4.6

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:6.3

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.1

Trust: 0.6

vendor:ibmmodel:bladecenter -sscope:eqversion:8886

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7800scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-10scope:eqversion:4.6.2

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.5.0

Trust: 0.6

vendor:hpmodel:office connect ps1810scope:eqversion:0

Trust: 0.6

vendor:ibmmodel:qradar siem mr2scope:eqversion:7.1

Trust: 0.6

vendor:avayamodel:aura communication manager ssp04scope:eqversion:6.3

Trust: 0.6

vendor:ibmmodel:upward integration modules for microsoft system centerscope:eqversion:5.5.2

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.7

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8rscope: - version: -

Trust: 0.6

vendor:junipermodel:ex series network switches for ibm products pre 12.3r9scope: - version: -

Trust: 0.6

vendor:asperasoftmodel:aspera faspexscope:eqversion:3.0.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx3002scope:eqversion:4.4

Trust: 0.6

vendor:hpmodel:m.10scope:eqversion:0

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.1.3

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8nscope: - version: -

Trust: 0.6

vendor:hpmodel:virtual connect enterprise manager sdkscope:eqversion:7.4

Trust: 0.6

vendor:hpmodel: - scope:eqversion:79000

Trust: 0.6

vendor:asperasoftmodel:aspera proxyscope:neversion:1.2.3

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.3

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.2

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8yscope: - version: -

Trust: 0.6

vendor:asperasoftmodel:aspera mobilescope:eqversion:0

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.5

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.2

Trust: 0.6

vendor:ibmmodel:upward integration modules for microsoft system centerscope:neversion:5.5.3

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1

Trust: 0.6

vendor:opensslmodel:project openssl beta4scope:eqversion:1.0.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412scope:eqversion:4.6.1

Trust: 0.6

vendor:hpmodel:h.10scope:eqversion:0

Trust: 0.6

vendor:ibmmodel:upward integration modules hardware management packscope:eqversion:5.5.2

Trust: 0.6

vendor:ibmmodel:upward integration modules for microsoft system centerscope:eqversion:5.0.2

Trust: 0.6

vendor:citrixmodel:netscaler application delivery controllerscope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0lscope: - version: -

Trust: 0.6

vendor:vmwaremodel:vcenter serverscope:eqversion:5.0

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.20

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004-v2scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:upward integration modules integrated installerscope:eqversion:5.5.2

Trust: 0.6

vendor:ibmmodel:general parallel file systemscope:eqversion:3.5.0

Trust: 0.6

vendor:opensslmodel:project openssl beta5scope:eqversion:1.0.0

Trust: 0.6

vendor:ibmmodel:bladecenter -escope:eqversion:7967

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.1

Trust: 0.6

vendor:asperasoftmodel:aspera drivescope:eqversion:0

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.1.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.3

Trust: 0.6

vendor:hpmodel:version control agentscope:eqversion:7.3.3

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.2.2

Trust: 0.6

vendor:hpmodel:insight control server deploymentscope:eqversion:7.2.0

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.2.3

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.1.4

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.3

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8pscope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.3.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008-v2scope:eqversion:4.5

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208scope:eqversion:4.6.1

Trust: 0.6

vendor:ibmmodel:bladecenter -hscope:eqversion:8852

Trust: 0.6

vendor:hpmodel:12500(comwarescope:eqversion:v7)0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4002scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:bladecenter -htscope:eqversion:8750

Trust: 0.6

vendor:ibmmodel:upward integration modules for microsoft system centerscope:eqversion:5.5.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108scope:eqversion:4.3

Trust: 0.6

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.6

vendor:hpmodel: - scope:eqversion:57000

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.5.0

Trust: 0.6

vendor:vmwaremodel:esxiscope:eqversion:5.0

Trust: 0.6

vendor:asperasoftmodel:aspera consolescope:eqversion:2.3.1

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:6.0.1

Trust: 0.6

vendor:hpmodel:insight controlscope:eqversion:7.2

Trust: 0.6

vendor:ibmmodel:systems director common agent for linuxscope:eqversion:6.3.5

Trust: 0.6

vendor:hpmodel:rscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008-v2scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-05scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:cognos insightscope:eqversion:10.2.0.1

Trust: 0.6

vendor:vmwaremodel:esxi esxi550-20150110scope:neversion:5.5

Trust: 0.6

vendor:hpmodel:kbscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:power hmcscope:eqversion:7.7.8.0

Trust: 0.6

vendor:hpmodel:switch seriesscope:eqversion:129000

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3.3

Trust: 0.6

vendor:hpmodel:i.10scope:eqversion:0

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.2.1

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8zascope: - version: -

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-10scope:eqversion:4.5

Trust: 0.6

vendor:hpmodel:m.08scope:eqversion:0

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.2.2

Trust: 0.6

vendor:hpmodel:version control agentscope:eqversion:7.3.1

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.4.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008scope:eqversion:4.6.1

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8qscope: - version: -

Trust: 0.6

vendor:hpmodel:systems insight managerscope:neversion:7.5.1

Trust: 0.6

vendor:hpmodel:ssl for openvmsscope:eqversion:1.4-493

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.2

Trust: 0.6

vendor:avayamodel:aura communication managerscope:eqversion:6.3.8

Trust: 0.6

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.0.1

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3.6

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4002scope:eqversion:4.5

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.3.6

Trust: 0.6

vendor:ibmmodel:rational software architect realtime editionscope:eqversion:9.1

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san switchscope:eqversion:9.1.3

Trust: 0.6

vendor:hpmodel:ssl for openvmsscope:eqversion:1.4-453

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-10scope:eqversion:4.4

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.2

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:6.1

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1cscope: - version: -

Trust: 0.6

vendor:hpmodel:ssl for openvmsscope:eqversion:1.4-467

Trust: 0.6

vendor:hpmodel:vbscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0

Trust: 0.6

vendor:ibmmodel:bladecenter -escope:eqversion:1881

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.3.2

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:56001

Trust: 0.6

vendor:hpmodel:kascope:eqversion:0

Trust: 0.6

vendor:hpmodel:office connect pkscope:eqversion:18100

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4002scope:eqversion:4.4

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:0.9.8v

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108-v2scope:eqversion:4.3

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1fscope: - version: -

Trust: 0.6

vendor:hpmodel:ybscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:upward integration modules for vmware vspherescope:eqversion:3.0.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx6116scope:eqversion:4.6.2

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.2.4.1

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.3.1

Trust: 0.6

vendor:ibmmodel:upward integration modules for microsoft system centerscope:eqversion:5.0.1

Trust: 0.6

vendor:ibmmodel:upward integration modules scvmm add-inscope:eqversion:1.0.2

Trust: 0.6

vendor:ibmmodel:systems director common agent for windowsscope:eqversion:6.3.5

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8gscope: - version: -

Trust: 0.6

vendor:avayamodel:cms r17scope: - version: -

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san switch and san pass-thruscope:neversion:9.1.5.03.00

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.41

Trust: 0.6

vendor:asperasoftmodel:aspera ondemand for google cloudscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:power hmcscope:eqversion:8.8.2.0

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.21

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.1.0.0

Trust: 0.6

vendor:avayamodel:aura utility services sp7scope:eqversion:6.3

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.2.4

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.0

Trust: 0.6

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-05scope:eqversion:4.5

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx6116scope:eqversion:4.6.1

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.3.2

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:2.1

Trust: 0.6

vendor:asperasoftmodel:aspera consolescope:neversion:2.5.3

Trust: 0.6

vendor:hpmodel:insight controlscope:eqversion:7.4

Trust: 0.6

vendor:hpmodel:escope:eqversion:0

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.3.1

Trust: 0.6

vendor:ibmmodel:tivoli workload scheduler for applications fp02scope:eqversion:8.4

Trust: 0.6

vendor:ibmmodel:rational software architectscope:eqversion:9.1.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008-v2scope:eqversion:4.6

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx3002scope:eqversion:4.3

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:1.0.2

Trust: 0.6

vendor:opensslmodel:project openssl beta2scope:eqversion:1.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7800scope:eqversion:4.6

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208-v2scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:bladecenter -sscope:eqversion:7779

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.3

Trust: 0.6

vendor:ibmmodel:upward integration modules for vmware vspherescope:neversion:3.5.3

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.2.2

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san pass-thruscope:eqversion:9.1.2

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.1.2

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.0.2

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.2

Trust: 0.6

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-05scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.20

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108-v2scope:eqversion:4.5

Trust: 0.6

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.6

vendor:asperasoftmodel:aspera faspexscope:neversion:3.9

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.40

Trust: 0.6

vendor:hpmodel:msr2000 r0106p18scope:neversion: -

Trust: 0.6

vendor:hpmodel:vascope:eqversion:0

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.4.1

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208-v2scope:eqversion:4.6.1

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.32

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.2

Trust: 0.6

vendor:asperasoftmodel:aspera ondemand for softlayerscope:eqversion:0

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.2

Trust: 0.6

vendor:hpmodel:storage provisioning managerscope:eqversion:2.4

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.0

Trust: 0.6

vendor:asperasoftmodel:aspera ondemand for azurescope:eqversion:0

Trust: 0.6

vendor:hpmodel:r2311p05scope:neversion:5700

Trust: 0.6

vendor:asperasoftmodel:aspera sharesscope:neversion:1.9

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:6.0

Trust: 0.6

vendor:ibmmodel:qradar risk managerscope:eqversion:7.2.3

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san pass-thruscope:eqversion:9.1.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108-v2scope:eqversion:4.4

Trust: 0.6

vendor:hpmodel:msmscope:neversion:6.46.4.2.1

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.3.1

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.2.2

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.5.0

Trust: 0.6

vendor:asperasoftmodel:aspera clientscope:eqversion:0

Trust: 0.6

vendor:hpmodel:insight control server deploymentscope:eqversion:7.2.1

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8lscope: - version: -

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.1.1

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:11.3

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san pass-thruscope:eqversion:9.1

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.4

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.1

Trust: 0.6

vendor:ibmmodel:systems director common agent for windowsscope:eqversion:6.3.4

Trust: 0.6

vendor:asperasoftmodel:aspera outlook pluginscope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8zcscope:neversion: -

Trust: 0.6

vendor:opensslmodel:project openssl hscope:eqversion:0.9.8

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.2.1.0

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.2.5

Trust: 0.6

vendor:ibmmodel:image construction and composition toolscope:eqversion:2.2.1.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4002scope:eqversion:4.6

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.3

Trust: 0.6

vendor:ibmmodel:power hmcscope:eqversion:7.7.3.0

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2.3

Trust: 0.6

vendor:opensslmodel:project openssl iscope:eqversion:0.9.8

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3.2

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.1.0

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.2.0

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:10.1

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0iscope: - version: -

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:56003

Trust: 0.6

vendor:hpmodel:storage provisioning managerscope:eqversion:2.2.2

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.0.0

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.3.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:pureapplication systemscope:eqversion:1.0

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.4.1

Trust: 0.6

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.2

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.2.0

Trust: 0.6

vendor:vmwaremodel:vcenter serverscope:eqversion:5.5

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.3

Trust: 0.6

vendor:ibmmodel:systems director common agent for linuxscope:eqversion:6.3.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.3.1

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.2.1.2

Trust: 0.6

vendor:ibmmodel:cognos planningscope:eqversion:10.1.1

Trust: 0.6

vendor:ibmmodel:tivoli workload scheduler for applicationsscope:eqversion:8.6

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:6.2

Trust: 0.6

vendor:ibmmodel:security virtual server protection for vmwarescope:eqversion:1.1

Trust: 0.6

vendor:hpmodel:insight control server provisioningscope:eqversion:7.5.0

Trust: 0.6

vendor:hpmodel:insight control server provisioningscope:eqversion:7.4.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008-v2scope:eqversion:4.6.1

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0escope: - version: -

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208scope:eqversion:4.6.2

Trust: 0.6

vendor:applemodel:mac osscope:neversion:x10.10.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7800scope:eqversion:4.6.1

Trust: 0.6

vendor:opensslmodel:project openssl beta1scope:eqversion:1.0

Trust: 0.6

vendor:hpmodel:storage provisioning managerscope:eqversion:2.2

Trust: 0.6

vendor:hpmodel:version control agentscope:eqversion:7.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-10scope:eqversion:4.3

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:0.9.8

Trust: 0.6

vendor:hpmodel:system management homepagescope:neversion:7.5.5

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.1.0

Trust: 0.6

vendor:hpmodel:ssl for openvmsscope:eqversion:1.4

Trust: 0.6

vendor:vmwaremodel:esxiscope:eqversion:5.5

Trust: 0.6

vendor:asperasoftmodel:aspera sharesscope:eqversion:1.7.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-05scope:eqversion:4.6

Trust: 0.6

vendor:avayamodel:aura collaboration environmentscope:eqversion:2.0

Trust: 0.6

vendor:ibmmodel:cognos insightscope:eqversion:10.2.1.2

Trust: 0.6

vendor:hpmodel:insight control server deploymentscope:eqversion:7.1.2

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:0.9.8x

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.3.2

Trust: 0.6

vendor:hpmodel:storage provisioning managerscope:eqversion:2.3.2

Trust: 0.6

vendor:hpmodel:ps110scope:eqversion:0

Trust: 0.6

vendor:ibmmodel:upward integration modules hardware management packscope:neversion:5.5.3

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.33

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.2.1

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.3.0

Trust: 0.6

vendor:ibmmodel:upward integration modules integrated installerscope:neversion:5.5.3

Trust: 0.6

vendor:hpmodel:insight control server deploymentscope:eqversion:7.3.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004scope:eqversion:4.6.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.4

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.3.3

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8tscope: - version: -

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.1.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004-v2scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108-v2scope:eqversion:4.6

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.2.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.6

Trust: 0.6

vendor:hpmodel:switch series (comwarescope:eqversion:10500v7)0

Trust: 0.6

vendor:asperasoftmodel:aspera faspexscope:eqversion:3.7.5

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.2.1

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0cscope: - version: -

Trust: 0.6

vendor:ibmmodel:qradar vulnerability managerscope:eqversion:7.2.3

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:8.0

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.2.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4002scope:eqversion:4.6.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108scope:eqversion:4.6.1

Trust: 0.6

vendor:ibmmodel:systems director common agent for windowsscope:eqversion:6.3.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412scope:eqversion:4.5

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.2.3

Trust: 0.6

vendor:ibmmodel:power hmcscope:eqversion:8.8.1.0

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.2.1

Trust: 0.6

vendor:hpmodel:rascope:eqversion:0

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10.4

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.1.1

Trust: 0.6

vendor:hpmodel:rf managerscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:power hmcscope:eqversion:7.7.9.0

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.1

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.4

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx3002scope:eqversion:4.6

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.6.0

Trust: 0.6

vendor:ibmmodel:cognos planningscope:eqversion:10.1

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0fscope: - version: -

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-05scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:tivoli management frameworkscope:eqversion:4.1.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:pureapplication systemscope:eqversion:1.1

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.3

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:2.2

Trust: 0.6

vendor:hpmodel:h.07scope:eqversion:0

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.3.1

Trust: 0.6

vendor:hpmodel:ssl for openvmsscope:neversion:1.4-495

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.1.1

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208scope:eqversion:4.5

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004-v2scope:eqversion:4.5

Trust: 0.6

vendor:ibmmodel:cognos insightscope:eqversion:10.2.2.2

Trust: 0.6

vendor:hpmodel:office connect pmscope:eqversion:18100

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0jscope: - version: -

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.2

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0bscope: - version: -

Trust: 0.6

vendor:hpmodel:yascope:eqversion:0

Trust: 0.6

vendor:hpmodel:switch series r2311p05scope:neversion:5900

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:bladecenter t advanced management module 32r0835scope: - version: -

Trust: 0.6

vendor:hpmodel:msmscope:neversion:6.26.2.1.2

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.3.0

Trust: 0.6

vendor:ibmmodel:lotus protector for mail securityscope:eqversion:2.80

Trust: 0.6

vendor:hpmodel:ssl for openvmsscope:eqversion:1.4-471

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.6

vendor:hpmodel:version control agentscope:eqversion:7.2.2

Trust: 0.6

vendor:avayamodel:aura presence services sp2scope:eqversion:6.1

Trust: 0.6

vendor:hpmodel:12500(comware r7328p04scope:neversion:v7)

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:9.1

Trust: 0.6

vendor:avayamodel:aura presence services sp1scope:eqversion:6.1

Trust: 0.6

vendor:asperasoftmodel:aspera consolescope:eqversion:2.0.1

Trust: 0.6

vendor:ibmmodel:systems director common agent for linuxscope:eqversion:6.3.3

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.3.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004-v2scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.3.2

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:5.0

Trust: 0.6

vendor:ibmmodel:systems director common agent for linuxscope:eqversion:6.3.4

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.5

Trust: 0.6

vendor:hpmodel:wscope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:1.0.1

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.1.1

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.1.2

Trust: 0.6

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.6

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.6

vendor:ibmmodel:lotus protector for mail securityscope:eqversion:2.8.1.0

Trust: 0.6

vendor:ibmmodel:power hmcscope:eqversion:7.7.7.0

Trust: 0.6

vendor:opensslmodel:project openssl beta3scope:eqversion:1.0

Trust: 0.6

vendor:opensslmodel:project openssl fscope:eqversion:0.9.8

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.3.1

Trust: 0.6

vendor:ibmmodel:bladecenter -tscope:eqversion:8730

Trust: 0.6

vendor:citrixmodel:cloudbridgescope:eqversion:0

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:6.3

Trust: 0.6

vendor:hpmodel:version control repository managerscope:neversion:7.5.1

Trust: 0.6

vendor:hpmodel:pbscope:eqversion:0

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2.2

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:2.0

Trust: 0.6

vendor:ibmmodel:tivoli workload scheduler for applications fp01scope:eqversion:8.5

Trust: 0.6

vendor:hpmodel:msmscope:neversion:6.56.5.1.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx6116scope:eqversion:4.3

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.2

Trust: 0.6

vendor:ibmmodel:upward integration modules for microsoft system centerscope:eqversion:5.5

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1dscope: - version: -

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.2

Trust: 0.6

vendor:ibmmodel:bladecenter -hscope:eqversion:7989

Trust: 0.6

vendor:ibmmodel:rational software architectscope:eqversion:9.1

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3.10

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san switchscope:eqversion:9.1.2

Trust: 0.6

vendor:opensslmodel:project openssl beta1scope:eqversion:1.0.1

Trust: 0.6

vendor:ibmmodel:bladecenter -htscope:eqversion:8740

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1.0

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:6.2

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.2.1

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:8.5

Trust: 0.6

vendor:ibmmodel:cognos controllerscope:eqversion:8.5

Trust: 0.6

vendor:ibmmodel:cognos controllerscope:eqversion:10.1.1

Trust: 0.6

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.6

vendor:asperasoftmodel:aspera consolescope:eqversion:2.3

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx3002scope:eqversion:4.6.1

Trust: 0.6

vendor:asperasoftmodel:aspera faspexscope:eqversion:3.7.7

Trust: 0.6

vendor:applemodel:xcodescope:neversion:7.0

Trust: 0.6

vendor:hpmodel:switch series r2111p06scope:neversion:11900

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208-v2scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-10scope:eqversion:4.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.6

vendor:asperasoftmodel:aspera orchestratorscope:neversion:2.10

Trust: 0.6

vendor:ibmmodel:flex system fc3171 8gb san switchscope:eqversion:9.1.1

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.3.2

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.1.3

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2.4

Trust: 0.6

vendor:ibmmodel:systems director common agent for windowsscope:eqversion:6.3.3

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0nscope: - version: -

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.0

Trust: 0.6

vendor:hpmodel:insight control server provisioningscope:eqversion:7.4.1

Trust: 0.6

vendor:avayamodel:aura session manager sp1scope:eqversion:6.2

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.4.0

Trust: 0.6

vendor:hpmodel:ei switch seriesscope:eqversion:51300

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx6116scope:eqversion:4.5

Trust: 0.6

vendor:hpmodel:switch seriesscope:eqversion:59200

Trust: 0.6

vendor:ibmmodel:cognos tm1scope:eqversion:10.2

Trust: 0.6

vendor:hpmodel:yscope:eqversion:0

Trust: 0.6

vendor:hpmodel:uscope:eqversion:0

Trust: 0.6

vendor:hpmodel:insight controlscope:neversion:7.5.1

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:2.4.1

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.3.3.1

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.4.34

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.6

vendor:avayamodel:aura communication managerscope:eqversion:6.3

Trust: 0.6

vendor:hpmodel:lscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208scope:eqversion:4.6

Trust: 0.6

vendor:hpmodel:server migration packscope:eqversion:7.5

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004-v2scope:eqversion:4.6

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:3.2.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008-v2scope:eqversion:4.6.2

Trust: 0.6

vendor:hpmodel:m220scope:eqversion:0

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:56002

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7800scope:eqversion:4.6.2

Trust: 0.6

vendor:hpmodel:insight controlscope:eqversion:7.5

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx6116scope:eqversion:4.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.6

vendor:ibmmodel:cognos controllerscope:eqversion:10.2.1

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3

Trust: 0.6

vendor:asperasoftmodel:aspera ondemand for amazonscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:neversion:1.1.0.9

Trust: 0.6

vendor:hpmodel:version control agentscope:eqversion:7.3.2

Trust: 0.6

vendor:hpmodel:msmscope:neversion:6.36.3.1.0

Trust: 0.6

vendor:avayamodel:aura system manager sp3scope:eqversion:6.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208-v2scope:eqversion:4.5

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8oscope: - version: -

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.2

Trust: 0.6

vendor:hpmodel:server migration packscope:neversion:7.5.1

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1bscope: - version: -

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0kscope: - version: -

Trust: 0.6

vendor:ibmmodel:bladecenter -hscope:eqversion:1886

Trust: 0.6

vendor:hpmodel:switch seriesscope:eqversion:59000

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.2.1

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:7.4

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:eqversion:7.3.1

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.0.5

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004scope:eqversion:4.6.2

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.6

vendor:hpmodel:msr2000scope:eqversion:0

Trust: 0.6

vendor:hpmodel:ascope:eqversion:0

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.6

vendor:ibmmodel:qradar siemscope:eqversion:7.2.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208-v2scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:cognos controllerscope:eqversion:10.1

Trust: 0.6

vendor:avayamodel:aura utility servicesscope:eqversion:6.3

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.0.1

Trust: 0.6

vendor:ibmmodel:bladecenter -escope:eqversion:8677

Trust: 0.6

vendor:ibmmodel:upward integration modules for vmware vspherescope:eqversion:3.5.2

Trust: 0.6

vendor:ibmmodel:cognos controllerscope:eqversion:10.2

Trust: 0.6

vendor:ibmmodel:systems director common agent for linuxscope:eqversion:6.3.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.6

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.2.1

Trust: 0.6

vendor:hpmodel:fscope:eqversion:0

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8sscope: - version: -

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4002scope:eqversion:4.6.2

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5208scope:eqversion:4.3

Trust: 0.6

vendor:ibmmodel:qradar risk manager mr2scope:eqversion:7.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5108scope:eqversion:4.6.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7412-10scope:eqversion:4.6.1

Trust: 0.6

vendor:hpmodel:switch series r1005p15scope:neversion:12900

Trust: 0.6

vendor:ibmmodel:systems director storage controlscope:eqversion:4.2.3.0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004scope:eqversion:4.3

Trust: 0.6

vendor:avayamodel:aura utility servicesscope:eqversion:6.2

Trust: 0.6

vendor:hpmodel:office connect pscope:eqversion:18100

Trust: 0.6

vendor:asperasoftmodel:aspera orchestratorscope:eqversion:0

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.2.1

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:8.1

Trust: 0.6

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.6

vendor:citrixmodel:netscaler service delivery appliancescope:eqversion:0

Trust: 0.6

vendor:hpmodel:matrix operating environmentscope:neversion:7.5.1

Trust: 0.6

vendor:opensslmodel:project openssl beta2scope:eqversion:1.0.1

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7800scope:eqversion:4.5

Trust: 0.6

vendor:susemodel:manager for sle sp2scope:eqversion:111.7

Trust: 0.6

vendor:susemodel:studio onsitescope:eqversion:1.3

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004-v2scope:eqversion:4.6.1

Trust: 0.6

vendor:hpmodel:cloudsystem matrixscope:eqversion:7.3.2

Trust: 0.6

vendor:hpmodel:system management homepagescope:eqversion:7.3

Trust: 0.6

vendor:ibmmodel:infosphere information serverscope:eqversion:8.7

Trust: 0.6

vendor:ibmmodel:systems directorscope:eqversion:6.3.0.0

Trust: 0.6

vendor:hpmodel:insight control server deploymentscope:eqversion:7.2.2

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx5008scope:eqversion:4.3

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:10.0

Trust: 0.6

vendor:hpmodel:office connect plscope:eqversion:18100

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx6116scope:eqversion:4.6

Trust: 0.6

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.6

vendor:hpmodel:tscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx7800scope:eqversion:4.4

Trust: 0.6

vendor:ibmmodel:upward integration modules for vmware vspherescope:eqversion:3.5.1

Trust: 0.6

vendor:ibmmodel:security network intrusion prevention system gx4004scope:eqversion:4.5

Trust: 0.6

vendor:hpmodel:vsr1000 r0204p01scope:neversion: -

Trust: 0.6

vendor:hpmodel:switch series r2311p05scope:neversion:5920

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3.4

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:8.4

Trust: 0.6

vendor:hpmodel:version control repository managerscope:eqversion:7.3.4

Trust: 0.6

vendor:hpmodel:storage provisioning managerscope:eqversion:2.3

Trust: 0.6

vendor:ibmmodel:security virtual server protection for vmwarescope:eqversion:1.1.1

Trust: 0.6

vendor:hpmodel:ssl for openvmsscope:eqversion:1.4-476

Trust: 0.6

vendor:ibmmodel:systems director common agent for windowsscope:eqversion:6.3.2

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:4.3.3

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.1

Trust: 0.6

vendor:hpmodel:ei switch series r3108p03scope:neversion:5130

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.1hscope: - version: -

Trust: 0.6

vendor:ibmmodel:cognos tm1scope:eqversion:10.1.1

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0

Trust: 0.6

vendor:ibmmodel:flex system chassis management module 1.50.0scope: - version: -

Trust: 0.6

vendor:ibmmodel:flex system chassis management modulescope:eqversion:1.50.0

Trust: 0.6

vendor:ibmmodel:flex system chassis management module 1.40.1scope: - version: -

Trust: 0.6

vendor:hpmodel: - scope:eqversion:16200

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8fscope: - version: -

Trust: 0.3

vendor:hpmodel:switch seriesscope:eqversion:58200

Trust: 0.3

vendor:hpmodel:switch series r1809p03scope:neversion:5820

Trust: 0.3

vendor:hpmodel:msr4000scope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.8

Trust: 0.3

vendor:hpmodel:mcp r3303p18scope:neversion:6600

Trust: 0.3

vendor:hpmodel:msr3000 r0106p18scope:neversion: -

Trust: 0.3

vendor:susemodel:sle client toolsscope:eqversion:10

Trust: 0.3

vendor:hpmodel: - scope:eqversion:850/8700

Trust: 0.3

vendor:hpmodel:r5203p11scope:neversion:3100v2

Trust: 0.3

vendor:hpmodel:f5000-sscope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr1000 r2513p33scope:neversion: -

Trust: 0.3

vendor:hpmodel:msr9xxscope:eqversion:0

Trust: 0.3

vendor:hpmodel:switch seriesscope:eqversion:58300

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.6.0.0

Trust: 0.3

vendor:asperasoftmodel:asperascope:neversion:3.5.2

Trust: 0.3

vendor:hpmodel:r15xxscope:eqversion:19100

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv200scope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:switch series r5319p10scope:neversion:3610

Trust: 0.3

vendor:hpmodel:msr1000 russian version r2513l40.ruscope:neversion: -

Trust: 0.3

vendor:hpmodel:f5000-cscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv1000scope:eqversion:4.6

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:9.2

Trust: 0.3

vendor:hpmodel:a6600scope:eqversion:0

Trust: 0.3

vendor:hpmodel:r1828p06scope:neversion:12500

Trust: 0.3

vendor:hpmodel:u200s and cs f5123p30scope:neversion: -

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv200scope:eqversion:4.5

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp03scope:eqversion:8.6.0

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.5.1

Trust: 0.3

vendor:hpmodel:f1000-ascope:eqversion:0

Trust: 0.3

vendor:hpmodel:hsr6602 r3303p18scope:neversion: -

Trust: 0.3

vendor:hpmodel:a6600 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:si switch seriesscope:eqversion:51200

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv200scope:eqversion:4.4

Trust: 0.3

vendor:hpmodel:f1000-sscope:eqversion:0

Trust: 0.3

vendor:hpmodel: - scope:eqversion:3100v2-480

Trust: 0.3

vendor:hpmodel:msr93xscope:eqversion:0

Trust: 0.3

vendor:hpmodel:r1104scope:neversion:1620

Trust: 0.3

vendor:hpmodel:u200s and csscope:eqversion:0

Trust: 0.3

vendor:hpmodel:russian version r3303p18scope:neversion:6602

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.4

Trust: 0.3

vendor:hpmodel:f1000-escope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cognos tm1scope:eqversion:10.2.2.0

Trust: 0.3

vendor:hpmodel:g switch seriesscope:eqversion:48000

Trust: 0.3

vendor:hpmodel:vcxscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv1000scope:eqversion:4.6.1

Trust: 0.3

vendor:hpmodel:msr50-g2scope:eqversion:0

Trust: 0.3

vendor:hpmodel:ei switch series r2221p08scope:neversion:5500

Trust: 0.3

vendor:hpmodel:msr30scope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr1000scope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr30 russian version 2513l40.ruscope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp05scope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp01scope:eqversion:9.1.0

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8m beta1scope: - version: -

Trust: 0.3

vendor:hpmodel:a6600 r3303p18scope:neversion: -

Trust: 0.3

vendor:hpmodel:9500escope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr20 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:switch series r1118p11scope:neversion:5830

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler for z/os connectorscope:eqversion:8.5

Trust: 0.3

vendor:hpmodel:secblade iiiscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv200scope:eqversion:4.6

Trust: 0.3

vendor:susemodel:sle client tools for x86 64scope:eqversion:10

Trust: 0.3

vendor:hpmodel:msr30 r2513p33scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler for z/os connectorscope:eqversion:8.6

Trust: 0.3

vendor:hpmodel:msr50-g2 r2513p33scope:neversion: -

Trust: 0.3

vendor:hpmodel:msr1000 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:f5000 f3210p22scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp04scope:eqversion:8.5

Trust: 0.3

vendor:hpmodel:hsr6602 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:mcp russian version r3303p18scope:neversion:6600

Trust: 0.3

vendor:hpmodel:ei switch seriesscope:eqversion:51200

Trust: 0.3

vendor:hpmodel:msr50 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:hsr6800 r3303p18scope:neversion: -

Trust: 0.3

vendor:hpmodel:msr3000scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.5.1

Trust: 0.3

vendor:hpmodel:switch seriesscope:eqversion:125000

Trust: 0.3

vendor:hpmodel:switch series r1809p03scope:neversion:5800

Trust: 0.3

vendor:hpmodel:hi switch series r5501p06scope:neversion:5500

Trust: 0.3

vendor:hpmodel:secblade iii r3820p03scope:neversion: -

Trust: 0.3

vendor:hpmodel:hsr6800 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:switch series (comwarescope:eqversion:10500v5)0

Trust: 0.3

vendor:hpmodel:r3303p18scope:neversion:6602

Trust: 0.3

vendor:hpmodel:u200a and mscope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr20-1x r2513p33scope:neversion: -

Trust: 0.3

vendor:hpmodel:r1105scope:neversion:1920

Trust: 0.3

vendor:hpmodel:r11xxscope:eqversion:19100

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler for z/os connector fp02scope:eqversion:8.6

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.8

Trust: 0.3

vendor:hpmodel:switch seriesscope:eqversion:58000

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv1000scope:eqversion:4.6.2

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.8

Trust: 0.3

vendor:hpmodel:si switch series r2221p08scope:neversion:5500

Trust: 0.3

vendor:asperasoftmodel:aspera connect serverscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:z/tpfscope:eqversion:1.1.10

Trust: 0.3

vendor:hpmodel:r2110p03scope:neversion:3100v2-48

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:9.1

Trust: 0.3

vendor:hpmodel:9500e r1828p06scope:neversion: -

Trust: 0.3

vendor:hpmodel:f5000-s r3811p03scope:neversion: -

Trust: 0.3

vendor:hpmodel:a6600 russian version r3303p18scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp03scope:eqversion:8.5

Trust: 0.3

vendor:hpmodel:msr30-16 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:hsr6602scope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr30-16 russian version 2513l40.ruscope:neversion: -

Trust: 0.3

vendor:hpmodel:msr20-1x russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:f5000-c r3811p03scope:neversion: -

Trust: 0.3

vendor:hpmodel:si switch seriesscope:eqversion:55000

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler for z/os connector fp03scope:eqversion:8.5.1

Trust: 0.3

vendor:hpmodel:hsr6800scope:eqversion:0

Trust: 0.3

vendor:hpmodel:ei switch series r2221p08scope:neversion:5120

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.8

Trust: 0.3

vendor:hpmodel:msr50 g2 russian version 2513l40.ruscope:neversion: -

Trust: 0.3

vendor:susemodel:sle client tools for s390xscope:eqversion:10

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:8.6

Trust: 0.3

vendor:hpmodel:switch seriesscope:eqversion:36100

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv1000scope:eqversion:4.5

Trust: 0.3

vendor:hpmodel:msr30-16scope:eqversion:0

Trust: 0.3

vendor:hpmodel:hi switch seriesscope:eqversion:55000

Trust: 0.3

vendor:hpmodel:msr30-1x russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr30-1xscope:eqversion:0

Trust: 0.3

vendor:hpmodel:switch series r2110p03scope:neversion:3600v2

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp07scope:eqversion:8.4

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv1000scope:eqversion:4.4

Trust: 0.3

vendor:hpmodel:msr30 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:r15xx r1513p95scope:neversion:1910

Trust: 0.3

vendor:hpmodel:msr4000 r0106p18scope:neversion: -

Trust: 0.3

vendor:hpmodel:msr50 russian version 2513l40.ruscope:neversion: -

Trust: 0.3

vendor:hpmodel:switch seriesscope:eqversion:3600v20

Trust: 0.3

vendor:hpmodel:msr30-1x r2513p33scope:neversion: -

Trust: 0.3

vendor:hpmodel: - scope:eqversion:3100v20

Trust: 0.3

vendor:hpmodel:msr50 r2513p33scope:neversion: -

Trust: 0.3

vendor:asperasoftmodel:aspera enterprise serverscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp02scope:eqversion:8.6

Trust: 0.3

vendor:hpmodel:switch series r6708p10scope:neversion:7500

Trust: 0.3

vendor:hpmodel:g switch series r2221p08scope:neversion:4800

Trust: 0.3

vendor:hpmodel:f1000-e r3181p05scope:neversion: -

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv200scope:eqversion:4.6.2

Trust: 0.3

vendor:hpmodel:msr9xx r2513p33scope:neversion: -

Trust: 0.3

vendor:hpmodel:mcp russian versionscope:eqversion:66000

Trust: 0.3

vendor:hpmodel:4510g switch series r2221p08scope:neversion: -

Trust: 0.3

vendor:hpmodel:r11xx r1107scope:neversion:1910

Trust: 0.3

vendor:hpmodel:wx5002/5004scope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr30-16 r2513p33scope:neversion: -

Trust: 0.3

vendor:hpmodel:msr30-1x russian version 2513l40.ruscope:neversion: -

Trust: 0.3

vendor:asperasoftmodel:aspera point to pointscope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr50scope:eqversion:0

Trust: 0.3

vendor:hpmodel:f1000-a r3734p06scope:neversion: -

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv200scope:eqversion:4.6.1

Trust: 0.3

vendor:hpmodel:hsr6602 russian version r3303p18scope:neversion: -

Trust: 0.3

vendor:hpmodel: - scope:eqversion:8300

Trust: 0.3

vendor:hpmodel:hsr6800 russian version r3303p18scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.4

Trust: 0.3

vendor:hpmodel:4210g switch series r2221p08scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:9.1

Trust: 0.3

vendor:asperasoftmodel:aspera proxyscope:eqversion:0

Trust: 0.3

vendor:hpmodel:4210g switch seriesscope:eqversion:0

Trust: 0.3

vendor:hpmodel:f5000scope:eqversion:0

Trust: 0.3

vendor:hpmodel:virtual connect enterprise manager sdkscope:neversion:7.4.1

Trust: 0.3

vendor:hpmodel:ei switch seriesscope:eqversion:55000

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.8

Trust: 0.3

vendor:hpmodel:msr20-1xscope:eqversion:0

Trust: 0.3

vendor:asperasoftmodel:aspera cargoscope:eqversion:0

Trust: 0.3

vendor:hpmodel:mcpscope:eqversion:66000

Trust: 0.3

vendor:hpmodel: - scope:eqversion:125000

Trust: 0.3

vendor:hpmodel:switch seriesscope:eqversion:75000

Trust: 0.3

vendor:hpmodel: - scope:eqversion:19200

Trust: 0.3

vendor:hpmodel:si switch series r1513p95scope:neversion:5120

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributedscope:eqversion:9.2

Trust: 0.3

vendor:ibmmodel:security network intrusion prevention system gv1000scope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:r2507p34scope:neversion:6000

Trust: 0.3

vendor:hpmodel:f1000-s r3734p06scope:neversion: -

Trust: 0.3

vendor:hpmodel:msr50 g2 russian versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:msr20-1x russian version 2513l40.ruscope:neversion: -

Trust: 0.3

vendor:hpmodel:secblade ssl vpnscope:eqversion:0

Trust: 0.3

vendor:hpmodel: - scope:eqversion:66020

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler distributed fp04scope:eqversion:8.5.1

Trust: 0.3

vendor:hpmodel:russian versionscope:eqversion:66020

Trust: 0.3

vendor:hpmodel: - scope:eqversion:60000

Trust: 0.3

vendor:hpmodel:msr20 russian version 2513l40.ruscope:neversion: -

Trust: 0.3

vendor:hpmodel:secblade fwscope:eqversion:0

Trust: 0.3

vendor:hpmodel:u200a and m f5123p30scope:neversion: -

Trust: 0.3

vendor:hpmodel:switch series (comware r1208p10scope:neversion:10500v5)

Trust: 0.3

vendor:hpmodel:4510g switch seriesscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8uscope: - version: -

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet23g-2.06scope: - version: -

Trust: 0.3

vendor:hpmodel:bladesystem c-class onboard administratorscope:eqversion:4.11

Trust: 0.3

vendor:bluecoatmodel:malware analysis appliancescope:eqversion:4.1

Trust: 0.3

vendor:hpmodel:bladesystem c-class onboard administratorscope:eqversion:4.21

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8uscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.2

Trust: 0.3

vendor:bluecoatmodel:norman shark industrial control system protectionscope:neversion:5.2.3

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1.1

Trust: 0.3

vendor:bluecoatmodel:norman shark industrial control system protectionscope:eqversion:5.1

Trust: 0.3

vendor:bluecoatmodel:packetshaper s-seriesscope:eqversion:11.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.0.4

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 1.20.2scope: - version: -

Trust: 0.3

vendor:ibmmodel:connect:enterprise secure clientscope:eqversion:1.3

Trust: 0.3

vendor:hpmodel:cloudsystem enterprise softwarescope:neversion:8.1.2

Trust: 0.3

vendor:ibmmodel:sterling connect:enterprise for unixscope:eqversion:2.5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:bluecoatmodel:proxyavscope:eqversion:3.5

Trust: 0.3

vendor:bluecoatmodel:norman shark scada protectionscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.2

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:5.2

Trust: 0.3

vendor:bluecoatmodel:norman shark industrial control system protectionscope:eqversion:5.2

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:bluecoatmodel:content analysis system softwarescope:eqversion:1.1.2.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.1

Trust: 0.3

vendor:bluecoatmodel:policycenterscope:eqversion:9.2

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:7.1

Trust: 0.3

vendor:bluecoatmodel:cacheflowscope:eqversion:3.2

Trust: 0.3

vendor:ibmmodel:flex system ib6131 40gb infiniband switchscope:eqversion:3.4

Trust: 0.3

vendor:hpmodel:bladesystem c-class onboard administratorscope:neversion:4.40

Trust: 0.3

vendor:hpmodel:oneviewscope:eqversion:1.0

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.2

Trust: 0.3

vendor:bluecoatmodel:x-series xosscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.11

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:eqversion:1.5.0.11150-11

Trust: 0.3

vendor:bluecoatmodel:norman shark network protectionscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet21c-2.04scope: - version: -

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:ibmmodel:sterling connect:enterprise for unixscope:eqversion:2.4.4

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.4

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:bluecoatmodel:norman shark scada protectionscope:neversion:5.2.3

Trust: 0.3

vendor:ibmmodel:megaraid storage managerscope:eqversion:15.03.01.00

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.4

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp11scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:sterling file gatewayscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.0

Trust: 0.3

vendor:ibmmodel:initiate master data service patient hubscope:eqversion:9.7

Trust: 0.3

vendor:hpmodel:bladesystem c-class onboard administratorscope:eqversion:4.22

Trust: 0.3

vendor:ibmmodel:storwizescope:eqversion:v70000

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 1.40.2scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp12scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:infosphere master data management patient hubscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:netcool/system service monitor fp1 p14scope:eqversion:4.0.0-

Trust: 0.3

vendor:ibmmodel:flex system en6131 40gb ethernet switchscope:eqversion:3.4

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.2.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.4.6

Trust: 0.3

vendor:ibmmodel:flex system ib6131 40gb infiniband switchscope:neversion:3.4.1110

Trust: 0.3

vendor:bluecoatmodel:policycenterscope:neversion:9.2.10

Trust: 0.3

vendor:ibmmodel:netcool/system service monitor fp1scope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.10

Trust: 0.3

vendor:bluecoatmodel:cacheflowscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:connect:enterprise command line clientscope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.14

Trust: 0.3

vendor:bluecoatmodel:malware analyzer g2scope:eqversion:3.5

Trust: 0.3

vendor:bluecoatmodel:proxyavscope:eqversion:3.4

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.5

Trust: 0.3

vendor:bluecoatmodel:bcaaascope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:cloudsystem foundationscope:eqversion:8.0.2

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.11

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:7.6

Trust: 0.3

vendor:bluecoatmodel:norman shark scada protectionscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp2scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:infosphere master data managementscope:eqversion:11.0

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.9

Trust: 0.3

vendor:bluecoatmodel:content analysis systemscope:eqversion:1.2

Trust: 0.3

vendor:bluecoatmodel:content analysis system softwarescope:eqversion:1.1.53

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 1.20.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:10.1

Trust: 0.3

vendor:bluecoatmodel:security analytics platformscope:neversion:6.6.10

Trust: 0.3

vendor:bluecoatmodel:norman shark scada protectionscope:neversion:5.3.2

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.13

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.2

Trust: 0.3

vendor:bluecoatmodel:norman shark network protectionscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet24d-2.08scope: - version: -

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:6.0.6

Trust: 0.3

vendor:bluecoatmodel:malware analysis appliancescope:eqversion:4.2

Trust: 0.3

vendor:bluecoatmodel:security analytics platformscope:eqversion:7.0

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:3.8

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.5.0.11

Trust: 0.3

vendor:bluecoatmodel:cacheflowscope:eqversion:3.3

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:neversion:1.5.0.11150-11

Trust: 0.3

vendor:ibmmodel:infosphere master data management provider hubscope:eqversion:10.0

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.7

Trust: 0.3

vendor:bluecoatmodel:ssl visibility 3.8.2fscope:neversion: -

Trust: 0.3

vendor:hpmodel:cloudsystem enterprise softwarescope:eqversion:8.0.2

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.6

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0

Trust: 0.3

vendor:bluecoatmodel:directorscope:neversion:6.1.16.1

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:6.0.3

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:neversion:1.4.6.1146-109

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp10scope:eqversion:4.0.0

Trust: 0.3

vendor:bluecoatmodel:proxysg sgosscope:eqversion:5.5

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:6.0.4

Trust: 0.3

vendor:ibmmodel:connect:enterprise secure clientscope:eqversion:1.4

Trust: 0.3

vendor:bluecoatmodel:security analytics platformscope:neversion:7.1.6

Trust: 0.3

vendor:ibmmodel:storwizescope:eqversion:v5000-

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet21e-2.05scope: - version: -

Trust: 0.3

vendor:asperasoftmodel:aspera proxyscope:eqversion:1.2.2

Trust: 0.3

vendor:bluecoatmodel:norman shark network protectionscope:neversion:5.3.2

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1

Trust: 0.3

vendor:asperasoftmodel:aspera connect serverscope:eqversion:3.5.1

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 1.40.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for imagesscope:eqversion:7.1.1.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.3

Trust: 0.3

vendor:bluecoatmodel:bcaaascope:eqversion:5.5

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet24b-2.07scope: - version: -

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:sterling file gatewayscope:eqversion:2.2

Trust: 0.3

vendor:bluecoatmodel:content analysis system softwarescope:eqversion:1.1.5.2

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:4.63

Trust: 0.3

vendor:hpmodel:bladesystem c-class onboard administratorscope:eqversion:4.20

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:7.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.10

Trust: 0.3

vendor:splunkmodel:splunkscope:neversion:5.0.11

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp13scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.5

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:cognos tm1scope:eqversion:10.2.2

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp6scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.0

Trust: 0.3

vendor:asperasoftmodel:aspera connect serverscope:neversion:3.5.2

Trust: 0.3

vendor:hpmodel:version control repository manager 7.4.0ascope: - version: -

Trust: 0.3

vendor:bluecoatmodel:content analysis system softwarescope:eqversion:1.1.4.2

Trust: 0.3

vendor:hpmodel:oneviewscope:eqversion:1.01

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.0

Trust: 0.3

vendor:hpmodel:system management homepage 7.4.0ascope: - version: -

Trust: 0.3

vendor:bluecoatmodel:directorscope:eqversion:6.1.131

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:3.7

Trust: 0.3

vendor:ibmmodel:sterling connect:enterprise http optionscope:eqversion:1.3

Trust: 0.3

vendor:bluecoatmodel:malware analysis appliancescope:eqversion:4.1.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 1.20.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:eqversion:1.4.6.1146-108

Trust: 0.3

vendor:asperasoftmodel:aspera enterprise serverscope:eqversion:3.5.1

Trust: 0.3

vendor:bluecoatmodel:packetshaperscope:neversion:9.2.10

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.10

Trust: 0.3

vendor:hpmodel:cloudsystem foundationscope:eqversion:8.1

Trust: 0.3

vendor:asperasoftmodel:aspera point to pointscope:eqversion:3.5.1

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:7.3

Trust: 0.3

vendor:ibmmodel:initiate master data service provider hubscope:eqversion:9.5

Trust: 0.3

vendor:bluecoatmodel:packetshaper s-seriesscope:eqversion:11.2

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.3

Trust: 0.3

vendor:splunkmodel:splunkscope:neversion:6.0.7

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp8scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:flex systemscope:eqversion:v70000

Trust: 0.3

vendor:hpmodel:imc uam e0302p07scope:neversion:7.1

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:4.71

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.2.0.0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:san volume controllerscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:tuxedoscope:eqversion:12.1.1.0

Trust: 0.3

vendor:bluecoatmodel:proxysg sgosscope:neversion:6.5.6.1

Trust: 0.3

vendor:bluecoatmodel:security analytics platformscope:eqversion:6.6

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:bluecoatmodel:packetshaper s-seriesscope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:infosphere master data managementscope:eqversion:11.3

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp4scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.12

Trust: 0.3

vendor:bluecoatmodel:proxysg sgosscope:eqversion:6.5

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.1

Trust: 0.3

vendor:bluecoatmodel:content analysis systemscope:eqversion:1.1

Trust: 0.3

vendor:hpmodel:bladesystem c-class onboard administratorscope:eqversion:4.30

Trust: 0.3

vendor:hpmodel:cloudsystem enterprise softwarescope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.1.0.0

Trust: 0.3

vendor:bluecoatmodel:cacheflowscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:initiate master data service provider hubscope:eqversion:9.7

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp9scope:eqversion:4.0.0

Trust: 0.3

vendor:bluecoatmodel:content analysis system softwarescope:eqversion:1.1.1.1

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:6.0.2

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp5scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.6

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet13a-2.00scope: - version: -

Trust: 0.3

vendor:ibmmodel:initiate master data service patient hubscope:eqversion:9.5

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 1.1.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.3

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.9

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.4

Trust: 0.3

vendor:bluecoatmodel:cacheflowscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.4

Trust: 0.3

vendor:hpmodel:imc uamscope:eqversion:0

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.5

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.8

Trust: 0.3

vendor:bluecoatmodel:packetshaperscope:eqversion:9.2

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:insight control server provisioning 7.4.0ascope: - version: -

Trust: 0.3

vendor:ibmmodel:sterling connect:enterprise http optionscope:eqversion:1.4

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 2.5.3tscope:neversion: -

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:storwizescope:eqversion:v3500-

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.0hscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 1.0.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp3scope:eqversion:4.0.0

Trust: 0.3

vendor:hpmodel:imc wsmscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:sterling b2b integratorscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.1

Trust: 0.3

vendor:ibmmodel:storwizescope:eqversion:v3700-

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1

Trust: 0.3

vendor:bluecoatmodel:directorscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp1scope:eqversion:4.0.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:tivoli netcool/system service monitor fp7scope:eqversion:4.0.0

Trust: 0.3

vendor:ibmmodel:sterling b2b integratorscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet17a-2.02scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.3.0

Trust: 0.3

vendor:bluecoatmodel:malware analyzer g2scope:eqversion:4.1

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet24j-2.10scope:neversion: -

Trust: 0.3

vendor:asperasoftmodel:aspera enterprise serverscope:neversion:3.5.2

Trust: 0.3

vendor:bluecoatmodel:proxysg sgosscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.5

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:6.0.1

Trust: 0.3

vendor:bluecoatmodel:norman shark industrial control system protectionscope:eqversion:5.0

Trust: 0.3

vendor:bluecoatmodel:norman shark network protectionscope:neversion:5.2.3

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:7.1.1

Trust: 0.3

vendor:hpmodel:oneviewscope:neversion:1.20

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:7.2

Trust: 0.3

vendor:hpmodel:oneviewscope:eqversion:1.10

Trust: 0.3

vendor:ibmmodel:infosphere master data managementscope:eqversion:11.4

Trust: 0.3

vendor:ibmmodel:nextscale n1200 enclosure fan power controller fhet24g-2.09scope: - version: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:7.4

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.0

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.8

Trust: 0.3

vendor:hpmodel:cloudsystem foundationscope:neversion:8.1.2

Trust: 0.3

vendor:bluecoatmodel:content analysis systemscope:neversion:1.2.3.1

Trust: 0.3

vendor:bluecoatmodel:reporter's isoscope:eqversion:9.4

Trust: 0.3

vendor:splunkmodel:splunkscope:eqversion:5.0.3

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.0

Trust: 0.3

vendor:hpmodel:oneviewscope:eqversion:1.05

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.3

Trust: 0.3

vendor:hpmodel:systems insight manager 7.4.0ascope: - version: -

Trust: 0.3

vendor:ibmmodel:flex system en6131 40gb ethernet switchscope:neversion:3.4.1110

Trust: 0.3

vendor:asperasoftmodel:aspera point to pointscope:neversion:3.5.2

Trust: 0.3

vendor:hpmodel:insight control server provisioningscope:neversion:7.4.1

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images system editionscope:eqversion:x7.1.1.0

Trust: 0.3

vendor:bluecoatmodel:security analytics platformscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.0

Trust: 0.3

sources: BID: 70585 // BID: 70586 // JVNDB: JVNDB-2014-004939 // NVD: CVE-2014-3513

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3513
value: HIGH

Trust: 1.0

NVD: CVE-2014-3513
value: HIGH

Trust: 0.8

VULMON: CVE-2014-3513
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-3513
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2014-3513 // JVNDB: JVNDB-2014-004939 // NVD: CVE-2014-3513

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2014-004939 // NVD: CVE-2014-3513

THREAT TYPE

network

Trust: 0.6

sources: BID: 70585 // BID: 70586

TYPE

Design Error

Trust: 0.6

sources: BID: 70585 // BID: 70586

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004939

PATCH

title:APPLE-SA-2015-09-16-2 Xcode 7.0url:http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html

Trust: 0.8

title:HT205217url:https://support.apple.com/en-us/HT205217

Trust: 0.8

title:HT205217url:http://support.apple.com/ja-jp/HT205217

Trust: 0.8

title:HPSBHF03300url:http://marc.info/?l=bugtraq&m=142804214608580&w=2

Trust: 0.8

title:HPSBMU03223url:http://marc.info/?l=bugtraq&m=143290583027876&w=2

Trust: 0.8

title:HPSBMU03260url:http://marc.info/?l=bugtraq&m=142495837901899&w=2

Trust: 0.8

title:HPSBMU03261url:http://marc.info/?l=bugtraq&m=143290522027658&w=2

Trust: 0.8

title:HPSBMU03263url:http://marc.info/?l=bugtraq&m=143290437727362&w=2

Trust: 0.8

title:HPSBMU03267url:http://marc.info/?l=bugtraq&m=142624590206005&w=2

Trust: 0.8

title:HPSBMU03296url:http://marc.info/?l=bugtraq&m=142834685803386&w=2

Trust: 0.8

title:HPSBMU03304url:http://marc.info/?l=bugtraq&m=142791032306609&w=2

Trust: 0.8

title:HPSBGN03233url:http://marc.info/?l=bugtraq&m=142118135300698&w=2

Trust: 0.8

title:HPSBMU03611url:https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05150888

Trust: 0.8

title:HPSBMU03612url:https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05158380

Trust: 0.8

title:AIX OpenSSL Denial of Service due to memory leak in DTLS SRTP extensionurl:http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc

Trust: 0.8

title:1686997url:http://www-01.ibm.com/support/docview.wss?uid=swg21686997

Trust: 0.8

title:Fix for SRTP Memory Leakurl:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d

Trust: 0.8

title:SRTP Memory Leak (CVE-2014-3513)url:https://www.openssl.org/news/secadv_20141015.txt

Trust: 0.8

title:RHSA-2014:1652url:http://rhn.redhat.com/errata/RHSA-2014-1652.html

Trust: 0.8

title:RHSA-2014:1692url:http://rhn.redhat.com/errata/RHSA-2014-1692.html

Trust: 0.8

title:sol15722: OpenSSL DTLS SRTP Memory Leak CVE-2014-3513url:https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html

Trust: 0.8

title:Multiple vulnerabilities in OpenSSLurl:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6

Trust: 0.8

title:The Registerurl:https://www.theregister.co.uk/2014/10/15/openssl_ddos_vulns/

Trust: 0.2

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2385-1

Trust: 0.1

title:Red Hat: CVE-2014-3513url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-3513

Trust: 0.1

title:Debian Security Advisories: DSA-3053-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=89bdef3607a7448566a930eca0e94cb3

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-427url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-427

Trust: 0.1

title:Symantec Security Advisories: SA87 : OpenSSL Security Advisory 15-Oct-2014url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=374cff59719675d8235f907c21b99bfc

Trust: 0.1

title:Tenable Security Advisories: [R7] OpenSSL '20141015' Advisory Affects Tenable Productsurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-11

Trust: 0.1

title:IBM: IBM Security Bulletin: Fabric OS firmware for Brocade 8Gb SAN Switch Module for BladeCenter is affected by vulnerabilities in OpenSSL and OpenSSHurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b7f5b1e7edcafce07f28205855d4db49

Trust: 0.1

sources: VULMON: CVE-2014-3513 // JVNDB: JVNDB-2014-004939

EXTERNAL IDS

db:NVDid:CVE-2014-3513

Trust: 3.7

db:SECUNIAid:61439

Trust: 1.1

db:SECUNIAid:61058

Trust: 1.1

db:SECUNIAid:61207

Trust: 1.1

db:SECUNIAid:61837

Trust: 1.1

db:SECUNIAid:62070

Trust: 1.1

db:SECUNIAid:61298

Trust: 1.1

db:SECUNIAid:61990

Trust: 1.1

db:SECUNIAid:61073

Trust: 1.1

db:SECUNIAid:59627

Trust: 1.1

db:SECUNIAid:61959

Trust: 1.1

db:SECTRACKid:1031052

Trust: 1.1

db:BIDid:70584

Trust: 1.1

db:MCAFEEid:SB10091

Trust: 1.1

db:JVNid:JVNVU99970459

Trust: 0.8

db:JVNDBid:JVNDB-2014-004939

Trust: 0.8

db:BIDid:70585

Trust: 0.3

db:BIDid:70586

Trust: 0.3

db:VULMONid:CVE-2014-3513

Trust: 0.1

db:PACKETSTORMid:169664

Trust: 0.1

db:PACKETSTORMid:130815

Trust: 0.1

db:PACKETSTORMid:129932

Trust: 0.1

db:PACKETSTORMid:131273

Trust: 0.1

db:PACKETSTORMid:132467

Trust: 0.1

db:PACKETSTORMid:132082

Trust: 0.1

db:PACKETSTORMid:132085

Trust: 0.1

db:PACKETSTORMid:130144

Trust: 0.1

db:PACKETSTORMid:128708

Trust: 0.1

db:PACKETSTORMid:137201

Trust: 0.1

db:PACKETSTORMid:132080

Trust: 0.1

db:PACKETSTORMid:128793

Trust: 0.1

sources: VULMON: CVE-2014-3513 // BID: 70585 // BID: 70586 // JVNDB: JVNDB-2014-004939 // PACKETSTORM: 169664 // PACKETSTORM: 130815 // PACKETSTORM: 129932 // PACKETSTORM: 131273 // PACKETSTORM: 132467 // PACKETSTORM: 132082 // PACKETSTORM: 132085 // PACKETSTORM: 130144 // PACKETSTORM: 128708 // PACKETSTORM: 137201 // PACKETSTORM: 132080 // PACKETSTORM: 128793 // NVD: CVE-2014-3513

REFERENCES

url:http://advisories.mageia.org/mgasa-2014-0416.html

Trust: 1.9

url:https://www.openssl.org/news/secadv_20141015.txt

Trust: 1.8

url:http://www-01.ibm.com/support/docview.wss?uid=swg21686997

Trust: 1.7

url:http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2014-1692.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2385-1

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2014-1652.html

Trust: 1.1

url:http://www.debian.org/security/2014/dsa-3053

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html

Trust: 1.1

url:http://secunia.com/advisories/59627

Trust: 1.1

url:http://secunia.com/advisories/61298

Trust: 1.1

url:http://secunia.com/advisories/61959

Trust: 1.1

url:http://secunia.com/advisories/61439

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html

Trust: 1.1

url:http://secunia.com/advisories/61073

Trust: 1.1

url:http://www.securityfocus.com/bid/70584

Trust: 1.1

url:http://secunia.com/advisories/62070

Trust: 1.1

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6

Trust: 1.1

url:http://www.securitytracker.com/id/1031052

Trust: 1.1

url:https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html

Trust: 1.1

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-015.txt.asc

Trust: 1.1

url:http://secunia.com/advisories/61207

Trust: 1.1

url:http://secunia.com/advisories/61058

Trust: 1.1

url:http://secunia.com/advisories/61990

Trust: 1.1

url:http://secunia.com/advisories/61837

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201412-39.xml

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142495837901899&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142624590206005&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142118135300698&w=2

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:062

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142791032306609&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142834685803386&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142804214608580&w=2

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2015/sep/msg00002.html

Trust: 1.1

url:https://support.apple.com/ht205217

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=143290583027876&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=143290437727362&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=143290522027658&w=2

Trust: 1.1

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10091

Trust: 1.1

url:https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=2b0532f3984324ebe1236a63d15893792384328d

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.9

url:http://jvn.jp/vu/jvnvu99970459/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3513

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.8

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.7

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.7

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.7

url:http://www.openssl.org

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21691210

Trust: 0.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574073

Trust: 0.6

url:http://seclists.org/bugtraq/2015/feb/151

Trust: 0.6

url:http://support.citrix.com/article/ctx216642

Trust: 0.6

url:https://www.freebsd.org/security/advisories/freebsd-sa-14:23.openssl.asc

Trust: 0.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04492722

Trust: 0.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04616259

Trust: 0.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04624296

Trust: 0.6

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888

Trust: 0.6

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380

Trust: 0.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04533567

Trust: 0.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04533567

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21686792

Trust: 0.6

url:https://support.asperasoft.com/entries/103000206-security-advisory-cve-2014-3513-cve-2014-3566-poodle-cve-2014-3567-cve-2014-3568

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097074

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21884030

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959134

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21691005

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21688284

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21697995

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21697165

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21689482

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097375

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098265

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1021548

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097587

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21701452

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098105

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21693662

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21689347

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097867

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098586

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097807

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21689743

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020593

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21691140

Trust: 0.6

url:https://downloads.avaya.com/css/p8/documents/101009000

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21699200

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21700489

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687863

Trust: 0.6

url:www-01.ibm.com/support/docview.wss?uid=ssg1s1005003

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-3508

Trust: 0.5

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-3509

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-3511

Trust: 0.5

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-5139

Trust: 0.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21689332

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21688762

Trust: 0.3

url:http://seclists.org/fulldisclosure/2015/jan/108

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21687676

Trust: 0.3

url:https://bto.bluecoat.com/security-advisory/sa87

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21690537

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959161

Trust: 0.3

url:http://www.splunk.com/view/sp-caaanst

Trust: 0.3

url:http://seclists.org/bugtraq/2015/may/158

Trust: 0.3

url:http://seclists.org/bugtraq/2015/may/156

Trust: 0.3

url:http://seclists.org/bugtraq/2015/may/157

Trust: 0.3

url:http://seclists.org/bugtraq/2015/may/159

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692

Trust: 0.3

url:http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445

Trust: 0.3

url:http://seclists.org/bugtraq/2015/apr/35

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098196

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687801

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21689101

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21700275

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098251

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097159

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097913

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21697162

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097911

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2015-0001.html

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2014-3513

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2385-1/

Trust: 0.1

url:https://www.openssl.org/~bodo/ssl-poodle.pdf

Trust: 0.1

url:https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Trust: 0.1

url:https://www.openssl.org/about/secpolicy.html

Trust: 0.1

url:http://www.software.hp.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7186

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7169

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6271

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6277

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6278

Trust: 0.1

url:http://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04486577-1

Trust: 0.1

url:https://technet.microsoft.com/library/security/3009008

Trust: 0.1

url:http://www.hp.com/go/insightupdates

Trust: 0.1

url:https://twitter.com/vmwaresrc

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1044

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566

Trust: 0.1

url:http://kb.vmware.com/kb/2078735

Trust: 0.1

url:http://kb.vmware.com/kb/2070666

Trust: 0.1

url:http://www.vmware.com/security/advisories

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1043

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8370

Trust: 0.1

url:http://kb.vmware.com/kb/2075521

Trust: 0.1

url:http://kb.vmware.com/kb/2065832

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:https://www.vmware.com/go/downloadplayer

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3660

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1043

Trust: 0.1

url:https://www.vmware.com/support/policies/lifecycle.html

Trust: 0.1

url:https://www.vmware.com/go/downloadworkstation

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3660

Trust: 0.1

url:http://kb.vmware.com/kb/2099265

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:https://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8370

Trust: 0.1

url:https://www.vmware.com/go/download-vsphere

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.7

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.22

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1790

Trust: 0.1

url:http://www.hpe.com/info/insightmanagement

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2019

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1792

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2020

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2018

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2022

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2027

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2026

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2021

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-3567

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/articles/1232123

Trust: 0.1

sources: VULMON: CVE-2014-3513 // BID: 70585 // BID: 70586 // JVNDB: JVNDB-2014-004939 // PACKETSTORM: 169664 // PACKETSTORM: 130815 // PACKETSTORM: 129932 // PACKETSTORM: 131273 // PACKETSTORM: 132467 // PACKETSTORM: 132082 // PACKETSTORM: 132085 // PACKETSTORM: 130144 // PACKETSTORM: 128708 // PACKETSTORM: 137201 // PACKETSTORM: 132080 // PACKETSTORM: 128793 // NVD: CVE-2014-3513

CREDITS

HP

Trust: 0.8

sources: PACKETSTORM: 130815 // PACKETSTORM: 129932 // PACKETSTORM: 131273 // PACKETSTORM: 132467 // PACKETSTORM: 132082 // PACKETSTORM: 132085 // PACKETSTORM: 137201 // PACKETSTORM: 132080

SOURCES

db:VULMONid:CVE-2014-3513
db:BIDid:70585
db:BIDid:70586
db:JVNDBid:JVNDB-2014-004939
db:PACKETSTORMid:169664
db:PACKETSTORMid:130815
db:PACKETSTORMid:129932
db:PACKETSTORMid:131273
db:PACKETSTORMid:132467
db:PACKETSTORMid:132082
db:PACKETSTORMid:132085
db:PACKETSTORMid:130144
db:PACKETSTORMid:128708
db:PACKETSTORMid:137201
db:PACKETSTORMid:132080
db:PACKETSTORMid:128793
db:NVDid:CVE-2014-3513

LAST UPDATE DATE

2025-02-18T19:44:56.765000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-3513date:2023-11-07T00:00:00
db:BIDid:70585date:2016-09-09T15:00:00
db:BIDid:70586date:2016-09-09T15:00:00
db:JVNDBid:JVNDB-2014-004939date:2016-10-07T00:00:00
db:NVDid:CVE-2014-3513date:2024-11-21T02:08:16.653

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-3513date:2014-10-19T00:00:00
db:BIDid:70585date:2014-10-15T00:00:00
db:BIDid:70586date:2014-10-15T00:00:00
db:JVNDBid:JVNDB-2014-004939date:2014-10-23T00:00:00
db:PACKETSTORMid:169664date:2014-10-15T12:12:12
db:PACKETSTORMid:130815date:2015-03-13T17:11:00
db:PACKETSTORMid:129932date:2015-01-14T03:51:42
db:PACKETSTORMid:131273date:2015-04-03T15:45:16
db:PACKETSTORMid:132467date:2015-06-29T15:35:42
db:PACKETSTORMid:132082date:2015-05-29T23:37:23
db:PACKETSTORMid:132085date:2015-05-29T23:37:43
db:PACKETSTORMid:130144date:2015-01-28T18:22:00
db:PACKETSTORMid:128708date:2014-10-17T00:03:35
db:PACKETSTORMid:137201date:2016-05-26T09:22:00
db:PACKETSTORMid:132080date:2015-05-29T23:37:04
db:PACKETSTORMid:128793date:2014-10-22T18:52:41
db:NVDid:CVE-2014-3513date:2014-10-19T01:55:13.887