ID

VAR-201609-0597


CVE

CVE-2016-2183


TITLE

SSL/TLS Protocol CVE-2016-2183 Information Disclosure Vulnerability

Trust: 0.3

sources: BID: 92630

DESCRIPTION

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. SSL/TLS Protocol is prone to an information-disclosure vulnerability Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. IPSec (full name Internet Protocol Security) is a set of IP security protocols established by the IPSec group of the Internet Engineering Task Force (IETF). Both DES and Triple DES are encryption algorithms. There are information leakage vulnerabilities in the DES and Triple DES encryption algorithms used in the TLS, SSH, and IPSec protocols and other protocols and products. This vulnerability stems from configuration errors in network systems or products during operation. 6) - i386, x86_64 3. (CVE-2016-2183, CVE-2016-5546, CVE-2016-5548, CVE-2016-5549, CVE-2016-5552, CVE-2017-3231, CVE-2017-3241, CVE-2017-3252, CVE-2017-3253, CVE-2017-3259, CVE-2017-3261, CVE-2017-3272) 4. Bugs fixed (https://bugzilla.redhat.com/): 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1413554 - CVE-2017-3272 OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) 1413583 - CVE-2017-3253 OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) 1413653 - CVE-2017-3261 OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) 1413717 - CVE-2017-3231 OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) 1413882 - CVE-2016-5552 OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) 1413906 - CVE-2017-3252 OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) 1413911 - CVE-2016-5546 OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) 1413920 - CVE-2016-5548 OpenJDK: DSA implementation timing attack (Libraries, 8168728) 1413923 - CVE-2016-5549 OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) 1413955 - CVE-2017-3241 OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) 1414163 - CVE-2017-3259 Oracle JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05369415 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05369415 Version: 1 HPSBGN03690 rev.1 - HPE Real User Monitor (RUM), Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-01-18 Last Updated: 2017-01-18 Potential Security Impact: Remote: Disclosure of Information Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A security vulnerability in DES/3DES block ciphers used in the TLS protocol, could potentially impact HPE Real User Monitor (RUM) resulting in remote disclosure of information also known as the SWEET32 attack. References: - CVE-2016-2183 - SWEET32 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP Real User Monitor Software Series v9.2x, v9.30 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2016-2183 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following mitigation information to resolve the vulnerability for impacted versions of HPE Real User Monitor (RUM): * <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02683527> HISTORY Version:1 (rev.1) - 18 January 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Description: The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. This release provides an update to httpd, OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References. This release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves as a update for Red Hat JBoss Web Server 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es): * It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788) * A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615) * A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12617) * A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) * A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798) Red Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno BAPck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and GaA<<tan Leurent (Inria) as the original reporters of CVE-2016-2183. Bug Fix(es): * Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1338640) * mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1448709) * CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1493075) 4. Solution: Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). After installing the updated packages, the httpd daemon will be restarted automatically. Bugs fixed (https://bugzilla.redhat.com/): 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1470748 - CVE-2017-9788 httpd: Uninitialized memory reflection in mod_auth_digest 1490344 - CVE-2017-9798 httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) 1493075 - Unable to load large CRL openssl problem 1493220 - CVE-2017-12615 tomcat: Remote Code Execution via JSP Upload 1494283 - CVE-2017-12617 tomcat: Remote Code Execution bypass for CVE-2017-12615 6. (BZ#1508885) 3. The References section of this erratum contains a download link (you must log in to download the update). The JBoss server process must be restarted for the update to take effect. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201707-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: IcedTea: Multiple vulnerabilities Date: July 05, 2017 Bugs: #607676, #609562, #618874, #619458 ID: 201707-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in IcedTea, the worst of which may allow execution of arbitrary code. Background ========== IcedTea's aim is to provide OpenJDK in a form suitable for easy configuration, compilation and distribution with the primary goal of allowing inclusion in GNU/Linux distributions. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-java/icedtea-bin < 3.4.0 >= 3.4.0 < 7.2.6.10 >= 7.2.6.10 Description =========== Multiple vulnerabilities have been discovered in IcedTea. Please review the CVE identifiers referenced below for details. Note: If the web browser plug-in provided by the dev-java/icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. Workaround ========== There is no known workaround at this time. Resolution ========== All IcedTea binary 7.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=dev-java/icedtea-bin-7.2.6.10:7" All IcedTea binary 3.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-3.4.0:8" References ========== [ 1 ] CVE-2016-2183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183 [ 2 ] CVE-2016-5546 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546 [ 3 ] CVE-2016-5547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547 [ 4 ] CVE-2016-5548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548 [ 5 ] CVE-2016-5549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549 [ 6 ] CVE-2016-5552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552 [ 7 ] CVE-2017-3231 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231 [ 8 ] CVE-2017-3241 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241 [ 9 ] CVE-2017-3252 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252 [ 10 ] CVE-2017-3253 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253 [ 11 ] CVE-2017-3260 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260 [ 12 ] CVE-2017-3261 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261 [ 13 ] CVE-2017-3272 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272 [ 14 ] CVE-2017-3289 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289 [ 15 ] CVE-2017-3509 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509 [ 16 ] CVE-2017-3511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511 [ 17 ] CVE-2017-3512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512 [ 18 ] CVE-2017-3514 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514 [ 19 ] CVE-2017-3526 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526 [ 20 ] CVE-2017-3533 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533 [ 21 ] CVE-2017-3539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539 [ 22 ] CVE-2017-3544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201707-01 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --eW2Ih3ajF3BNoJIAD1VrIt2me1kNx637S-- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: java-1.8.0-ibm security update Advisory ID: RHSA-2017:0462-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0462.html Issue date: 2017-03-08 CVE Names: CVE-2016-2183 ===================================================================== 1. Summary: An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR4-FP1. Security Fix(es): * This update fixes a vulnerability in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about this flaw can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2016-2183) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm ppc64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm s390x: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.ppc64.rpm ppc64le: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm s390x: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.s390.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.s390.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/updates/classification/#moderate https://developer.ibm.com/javasdk/support/security-vulnerabilities/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYwAfWXlSAg2UNWIIRApdJAJ9aWdfCBOWjqVaBLGFXAtS6LJvZXACgkneE 4LO+U1cfPB3cdxvKJ71gfCg= =89qB -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. (CVE-2017-9788) * It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. OpenSSL Security Advisory [22 Sep 2016] ======================================== OCSP Status Request extension unbounded memory growth (CVE-2016-6304) ===================================================================== Severity: High A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will eventually lead to a Denial Of Service attack through memory exhaustion. Servers with a default configuration are vulnerable even if they do not support OCSP. Builds using the "no-ocsp" build time option are not affected. Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support. OpenSSL 1.1.0 users should upgrade to 1.1.0a OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 29th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team. SSL_peek() hang on empty record (CVE-2016-6305) =============================================== Severity: Moderate OpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an empty record. This could be exploited by a malicious peer in a Denial Of Service attack. OpenSSL 1.1.0 users should upgrade to 1.1.0a This issue was reported to OpenSSL on 10th September 2016 by Alex Gaynor. The fix was developed by Matt Caswell of the OpenSSL development team. SWEET32 Mitigation (CVE-2016-2183) ================================== Severity: Low SWEET32 (https://sweet32.info) is an attack on older block cipher algorithms that use a block size of 64 bits. In mitigation for the SWEET32 attack DES based ciphersuites have been moved from the HIGH cipherstring group to MEDIUM in OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had these ciphersuites disabled by default. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 16th August 2016 by Karthikeyan Bhargavan and Gaetan Leurent (INRIA). The fix was developed by Rich Salz of the OpenSSL development team. OOB write in MDC2_Update() (CVE-2016-6303) ========================================== Severity: Low An overflow can occur in MDC2_Update() either if called directly or through the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption. The amount of data needed is comparable to SIZE_MAX which is impractical on most platforms. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 11th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team. Malformed SHA512 ticket DoS (CVE-2016-6302) =========================================== Severity: Low If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a DoS attack where a malformed ticket will result in an OOB read which will ultimately crash. The use of SHA512 in TLS session tickets is comparatively rare as it requires a custom server callback and ticket lookup mechanism. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 19th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team. OOB write in BN_bn2dec() (CVE-2016-2182) ======================================== Severity: Low The function BN_bn2dec() does not check the return value of BN_div_word(). This can cause an OOB write if an application uses this function with an overly large BIGNUM. This could be a problem if an overly large certificate or CRL is printed out from an untrusted source. TLS is not affected because record limits will reject an oversized certificate before it is parsed. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 2nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team. OOB read in TS_OBJ_print_bio() (CVE-2016-2180) ============================================== Severity: Low The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is the total length the OID text representation would use and not the amount of data written. This will result in OOB reads when large OIDs are presented. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 21st July 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team. Pointer arithmetic undefined behaviour (CVE-2016-2177) ====================================================== Severity: Low Avoid some undefined pointer arithmetic A common idiom in the codebase is to check limits in the following manner: "p + len > limit" Where "p" points to some malloc'd data of SIZE bytes and limit == p + SIZE "len" here could be from some externally supplied data (e.g. from a TLS message). The rules of C pointer arithmetic are such that "p + len" is only well defined where len <= SIZE. Therefore the above idiom is actually undefined behaviour. For example this could cause problems if some malloc implementation provides an address for "p" such that "p + len" actually overflows for values of len that are too big and therefore p + len < limit. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team. Constant time flag not preserved in DSA signing (CVE-2016-2178) =============================================================== Severity: Low Operations in the DSA signing algorithm should run in constant time in order to avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that a non-constant time codepath is followed for certain operations. This has been demonstrated through a cache-timing attack to be sufficient for an attacker to recover the private DSA key. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 23rd May 2016 by César Pereida (Aalto University), Billy Brumley (Tampere University of Technology), and Yuval Yarom (The University of Adelaide and NICTA). The fix was developed by César Pereida. DTLS buffered message DoS (CVE-2016-2179) ========================================= Severity: Low In a DTLS connection where handshake messages are delivered out-of-order those messages that OpenSSL is not yet ready to process will be buffered for later use. Under certain circumstances, a flaw in the logic means that those messages do not get removed from the buffer even though the handshake has been completed. An attacker could force up to approx. 15 messages to remain in the buffer when they are no longer required. These messages will be cleared when the DTLS connection is closed. The default maximum size for a message is 100k. Therefore the attacker could force an additional 1500k to be consumed per connection. By opening many simulataneous connections an attacker could cause a DoS attack through memory exhaustion. OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u This issue was reported to OpenSSL on 22nd June 2016 by Quan Luo. The fix was developed by Matt Caswell of the OpenSSL development team. DTLS replay protection DoS (CVE-2016-2181) ========================================== Severity: Low A flaw in the DTLS replay attack protection mechanism means that records that arrive for future epochs update the replay protection "window" before the MAC for the record has been validated. This could be exploited by an attacker by sending a record for the next epoch (which does not have to decrypt or have a valid MAC), with a very large sequence number. This means that all subsequent legitimate packets are dropped causing a denial of service for a specific DTLS connection. OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u This issue was reported to OpenSSL on 21st November 2015 by the OCAP audit team. The fix was developed by Matt Caswell of the OpenSSL development team. Certificate message OOB reads (CVE-2016-6306) ============================================= Severity: Low In OpenSSL 1.0.2 and earlier some missing message length checks can result in OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical DoS risk but this has not been observed in practice on common platforms. The messages affected are client certificate, client certificate request and server certificate. As a result the attack can only be performed against a client or a server which enables client authentication. OpenSSL 1.1.0 is not affected. OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u This issue was reported to OpenSSL on 22nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team. Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307) ========================================================================== Severity: Low A TLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if: 1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests. Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service. This issue does not affect DTLS users. OpenSSL 1.1.0 TLS users should upgrade to 1.1.0a This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team. Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308) ============================================================================= Severity: Low This issue is very similar to CVE-2016-6307. The underlying defect is different but the security analysis and impacts are the same except that it impacts DTLS. A DTLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if: 1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests. Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service. This issue does not affect TLS users. OpenSSL 1.1.0 DTLS users should upgrade to 1.1.0a This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team. Note ==== As per our previous announcements and our Release Strategy (https://www.openssl.org/policies/releasestrat.html), support for OpenSSL version 1.0.1 will cease on 31st December 2016. No security updates for that version will be provided after that date. Users of 1.0.1 are advised to upgrade. Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20160922.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html

Trust: 2.07

sources: NVD: CVE-2016-2183 // BID: 92630 // VULHUB: VHN-91002 // VULMON: CVE-2016-2183 // PACKETSTORM: 141353 // PACKETSTORM: 140708 // PACKETSTORM: 144869 // PACKETSTORM: 145017 // PACKETSTORM: 143244 // PACKETSTORM: 141555 // PACKETSTORM: 144134 // PACKETSTORM: 169633

AFFECTED PRODUCTS

vendor:opensslmodel:opensslscope:eqversion:1.0.1r

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1a

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:2.7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1i

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:0.12.16

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.5.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1n

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.5.3

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:4.1.2

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:4.6.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1o

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:eqversion:9.7.0-006

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1m

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:eqversion:9.6.6-068

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1l

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:4.2.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:6.7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1p

Trust: 1.0

vendor:redhatmodel:jboss enterprise web serverscope:eqversion:2.0.0

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:2.7.13

Trust: 1.0

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:6.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2b

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.4.7

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:4.0.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.4.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2f

Trust: 1.0

vendor:oraclemodel:databasescope:eqversion:12.1.0.2

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:0.10.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1j

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2d

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:0.12.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:0.10.47

Trust: 1.0

vendor:oraclemodel:databasescope:eqversion:11.2.0.4

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1t

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1q

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:6.0.0

Trust: 1.0

vendor:redhatmodel:jboss web serverscope:eqversion:3.0

Trust: 1.0

vendor:redhatmodel:jboss enterprise web serverscope:eqversion:1.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2c

Trust: 1.0

vendor:oraclemodel:jdk updatescope:eqversion:1.6131

Trust: 0.9

vendor:oraclemodel:jdk updatescope:eqversion:1.7121

Trust: 0.9

vendor:oraclemodel:jdk updatescope:eqversion:1.8111

Trust: 0.9

vendor:oraclemodel:jre updatescope:eqversion:1.6131

Trust: 0.9

vendor:oraclemodel:jdk updatescope:eqversion:1.8112

Trust: 0.9

vendor:oraclemodel:jre updatescope:eqversion:1.7121

Trust: 0.9

vendor:oraclemodel:jre updatescope:eqversion:1.8111

Trust: 0.9

vendor:oraclemodel:jre updatescope:eqversion:1.8112

Trust: 0.9

vendor:ciscomodel:paging serverscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.10

Trust: 0.3

vendor:ciscomodel:webex centers t32scope:neversion: -

Trust: 0.3

vendor:hpmodel:performance centerscope:eqversion:12.50

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.3

Trust: 0.3

vendor:ibmmodel:db2® workgroup server editionscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:30000

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:neversion:1.5.0.13150-13

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:db2 direct standard editionscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:clean access managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system z®scope:eqversion:10.5

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.2

Trust: 0.3

vendor:netappmodel:virtual storage console for vmware vspherescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus series blade switches 4.1 e1scope:neversion:4000

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:6.2.0.0

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.5.0.9

Trust: 0.3

vendor:ciscomodel:telepresence content serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:proactive network operations centerscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:6.5

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.4.1

Trust: 0.3

vendor:ibmmodel:db2® advanced enterprise server editionscope:eqversion:11.1

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:69010

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for linuxscope:neversion:4.0.7

Trust: 0.3

vendor:ciscomodel:ucs central softwarescope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:13.0

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.5.0.13

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.2

Trust: 0.3

vendor:ciscomodel:stealthwatch management consolescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:communications server for data center deploymentscope:eqversion:7.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.4

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment 5.1.fix packscope:eqversion:3

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.0

Trust: 0.3

vendor:ciscomodel:ios and cisco ios xe softwarescope:neversion:16.2

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for androidscope:neversion:4.0.7

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.5

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:neversion:12.1.2

Trust: 0.3

vendor:ciscomodel:jabber software development kitscope:neversion:11.8

Trust: 0.3

vendor:ibmmodel:db2® express editionscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:neversion:13.0

Trust: 0.3

vendor:netappmodel:data ontap 7-modescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:computer telephony integration object serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified workforce optimizationscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:f5model:lineratescope:eqversion:2.6.1

Trust: 0.3

vendor:ciscomodel:industrial router 1.2.1rb4scope:neversion:910

Trust: 0.3

vendor:f5model:firepassscope:eqversion:7.0

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:neversion:3.6

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.0.1

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6

Trust: 0.3

vendor:ibmmodel:java sdkscope:neversion:6.0.16.41

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:db2® connect? application server editionscope:eqversion:10.5

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.14

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.2.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6.1

Trust: 0.3

vendor:ciscomodel:ip interoperability and collaboration systemscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr seriesscope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:virtualization experience media editionscope:neversion:11.8

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3400

Trust: 0.3

vendor:ibmmodel:java sdkscope:neversion:7.1.4.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.0

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:42.20

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.0

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus series switches standalone nx-os modescope:eqversion:9000-0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:neversion:5.3.3.1

Trust: 0.3

vendor:ciscomodel:nexus series switches standalone nx-os mode 7.0 i5scope:neversion:9000-

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.11

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:13.0.1

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.1.2

Trust: 0.3

vendor:ciscomodel:nexus series switches 5.2.8scope:neversion:7000

Trust: 0.3

vendor:ibmmodel:db2 direct advanced editionscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for desktop platformsscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.26

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.6

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.1.1

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:12.53.0

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fiscope:eqversion:2.2.0.4

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.2

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:neversion:4.6.0.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.0

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:neversion:13.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:jabber guestscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.4.1

Trust: 0.3

vendor:ciscomodel:prime license managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:video surveillance ptz ip camerasscope:neversion:2.9

Trust: 0.3

vendor:ciscomodel:series digital media players 5.3.6 rb3scope:neversion:4300

Trust: 0.3

vendor:ciscomodel:stealthwatch flowcollector sflowscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.3

Trust: 0.3

vendor:ciscomodel:web security appliancescope:eqversion:0

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:12.01

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:6.1.0.0

Trust: 0.3

vendor:ciscomodel:visual quality experience serverscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.11

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:6.2.2

Trust: 0.3

vendor:netappmodel:data ontap powershell toolkitscope:eqversion:0

Trust: 0.3

vendor:netappmodel:clustered data ontapscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system i®scope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.7

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:agent for openflowscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:neversion:60002.9

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:11.6

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.2.4

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.8

Trust: 0.3

vendor:hpmodel:performance center patchscope:eqversion:12.013

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1

Trust: 0.3

vendor:ciscomodel:ons series multiservice provisioning platformsscope:eqversion:154540

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.15

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for desktop platformsscope:neversion:4.4

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.4

Trust: 0.3

vendor:ciscomodel:telepresence sx series ce8.2.2scope:neversion: -

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5

Trust: 0.3

vendor:ciscomodel:prime collaboration assurancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asa next-generation firewall servicesscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.4

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:10.0.1

Trust: 0.3

vendor:hpmodel:loadrunner buildscope:eqversion:8.1.0.01735

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:eqversion:8200

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.2

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.9

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.2

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:42.10

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:unified communications manager im & presence service (formerly cscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios and cisco ios xe softwarescope:neversion:16.3

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:41.11

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.5

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.1

Trust: 0.3

vendor:ciscomodel:webex meetings for blackberryscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:14.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.6

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.20

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.1

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:9

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.3

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.7

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:10.2

Trust: 0.3

vendor:ibmmodel:security virtual server protection for vmwarescope:eqversion:1.1.0.1

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:9.0.0.0

Trust: 0.3

vendor:ibmmodel:db2® express editionscope:eqversion:11.1

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:10

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.0.2

Trust: 0.3

vendor:ciscomodel:firesight system softwarescope:neversion:6.0.1.3

Trust: 0.3

vendor:ibmmodel:communications server for linux on system zscope:eqversion:6.4

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for mac osscope:neversion:x4.0.7

Trust: 0.3

vendor:ciscomodel:common services platform collectorscope:neversion:1.11

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system z®scope:eqversion:9.7

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.3

Trust: 0.3

vendor:ciscomodel:partner support servicescope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:media services interfacescope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.1

Trust: 0.3

vendor:ibmmodel:db2® connect? enterprise editionscope:eqversion:10.5

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:2.7.1

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.9

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.1.3

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.5

Trust: 0.3

vendor:hpmodel:real user monitor software seriesscope:eqversion:9.2

Trust: 0.3

vendor:f5model:traffix sdcscope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.2

Trust: 0.3

vendor:ciscomodel:jabber for iphone and ipadscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:cloud web securityscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime collaboration assurancescope:neversion:11.6

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.2h968406scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified attendant console advancedscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.7

Trust: 0.3

vendor:ciscomodel:common services platform collectorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for windowsscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:neversion:12.1.2

Trust: 0.3

vendor:ciscomodel:telepresence mx series ce8.2.2scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.6

Trust: 0.3

vendor:ibmmodel:db2 direct advanced editionscope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:spectrum controlscope:eqversion:5.2.8

Trust: 0.3

vendor:ciscomodel:webex meetings client on-premisesscope:eqversion:-0

Trust: 0.3

vendor:ciscomodel:unified intelligence centerscope:neversion:11.6(1)

Trust: 0.3

vendor:hpmodel:performance center agent fp1scope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:41.22

Trust: 0.3

vendor:ciscomodel:services provisioning platformscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ucs b-series blade serversscope:neversion:3.1.3

Trust: 0.3

vendor:ciscomodel:nac appliance clean access managerscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.0.0

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:12.1

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.4.6

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:10000

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:neversion:3.5.3

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.2

Trust: 0.3

vendor:f5model:traffix sdcscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:neversion:7.1.1.20290.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.0

Trust: 0.3

vendor:ciscomodel:jabber for androidscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asa next-generation firewall servicesscope:neversion:2.1.2

Trust: 0.3

vendor:netappmodel:ef-series santricity storage managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:6.3.0.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.405

Trust: 0.3

vendor:f5model:iworkflowscope:eqversion:2.0.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.2

Trust: 0.3

vendor:oraclemodel:api gatewayscope:eqversion:11.1.2.4.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.40

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.3

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:6.5

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.2

Trust: 0.3

vendor:ciscomodel:unified attendant console premium editionscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system i®scope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:services provisioning platform sfp1.1scope:neversion: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.7

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2.1

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:12.50

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.8

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:13.0.1

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysql workbenchscope:eqversion:6.1.5

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:video surveillance series high-definition ip camerasscope:eqversion:40000

Trust: 0.3

vendor:ciscomodel:jabber for androidscope:neversion:11.8

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.2.2

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for desktop platformsscope:neversion:4.3.4

Trust: 0.3

vendor:redhatmodel:enterprise linux for armscope:eqversion:647

Trust: 0.3

vendor:netappmodel:system setupscope:eqversion:0

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:42.22

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:12

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.5

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.4.1.0

Trust: 0.3

vendor:hpmodel:performance centerscope:eqversion:11.52

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.6

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:neversion:30002.9

Trust: 0.3

vendor:ciscomodel:series digital media players 5.3.6 rb3scope:neversion:4400

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.20

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:mysql workbenchscope:eqversion:6.3.8

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.0

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.2

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.10

Trust: 0.3

vendor:ciscomodel:stealthwatch identityscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:270016.2

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.2.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:neversion:12.1.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.

Trust: 0.3

vendor:ibmmodel:db2® enterprise server editionscope:eqversion:10.5

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.3.1.0

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:13.0.1

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:neversion:2.2(1)

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:9.52

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.2

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.6

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.1.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.4

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:270016.1

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.5

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.1

Trust: 0.3

vendor:hpmodel:performance centerscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.2

Trust: 0.3

vendor:ciscomodel:unified workforce optimization quality management solution 11.5 su1scope:neversion: -

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:10.2.2

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.2

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:2.0.5

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:11.1

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:12.022

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for imagesscope:eqversion:7.1.1.19

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.5

Trust: 0.3

vendor:ciscomodel:universal small cell iuhscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ucs directorscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images buildscope:eqversion:7.1.1.20280.6

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:12.1.3

Trust: 0.3

vendor:pexipmodel:infinityscope:neversion:13

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.3

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.3

Trust: 0.3

vendor:ciscomodel:jabber client framework componentsscope:neversion:11.8

Trust: 0.3

vendor:hpmodel:performance center patchscope:eqversion:12.534

Trust: 0.3

vendor:ciscomodel:telepresence isdn linkscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.3

Trust: 0.3

vendor:ciscomodel:webex meetings client on-premises t32scope:neversion: -

Trust: 0.3

vendor:ciscomodel:telepresence profile series tc7.3.7scope:neversion: -

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:neversion:13.0

Trust: 0.3

vendor:ciscomodel:dcm series d9900 digital content managerscope:neversion:0

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:70006.2.19

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:6.5.1

Trust: 0.3

vendor:f5model:traffix sdcscope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:unified attendant console business editionscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:communications server for aixscope:eqversion:6.4

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.3.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.1

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.2.3

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2iscope:neversion: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.14

Trust: 0.3

vendor:f5model:iworkflowscope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:270016.4

Trust: 0.3

vendor:ibmmodel:bigfix remote controlscope:eqversion:9.1.2

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5

Trust: 0.3

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:prime network services controller 1.01uscope:neversion: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.12

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.0

Trust: 0.3

vendor:oraclemodel:oss support toolsscope:eqversion:8.9.15.9.8

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.4.1

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.2.1

Trust: 0.3

vendor:ciscomodel:firesight system softwarescope:neversion:5.4.0.10

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:nexus series switches 5.2 sv3scope:neversion:1000v

Trust: 0.3

vendor:ibmmodel:communications server for windowsscope:eqversion:6.4

Trust: 0.3

vendor:ciscomodel:telepresence system tx1310scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified communications domain managerscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.3

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty media andscope:neversion:3103204.4

Trust: 0.3

vendor:ibmmodel:db2® workgroup server editionscope:eqversion:9.7

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:5.0.2

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.4

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:neversion:5.1.1051.08

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.10

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2hscope: - version: -

Trust: 0.3

vendor:ibmmodel:db2 direct standard editionscope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:nac guest serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:enterprise content delivery systemscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.11

Trust: 0.3

vendor:f5model:lineratescope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for linuxscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.7

Trust: 0.3

vendor:ibmmodel:db2® connect? enterprise editionscope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:telepresence system ex seriesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime collaboration deploymentscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex business suitescope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.3

Trust: 0.3

vendor:ciscomodel:dx series ip phonesscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:14.0

Trust: 0.3

vendor:ciscomodel:telepresence system ex series tc7.3.7scope:neversion: -

Trust: 0.3

vendor:ibmmodel:db2® advanced enterprise server editionscope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:ios and cisco ios xe softwarescope:neversion:15.5(3)

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.18

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:7.1.3.60

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for androidscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:13.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.19

Trust: 0.3

vendor:ciscomodel:nexus series blade switchesscope:eqversion:40000

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:8.0.3.22

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.5.0.0

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.5.0.11

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:neversion:500-376.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.4

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:jabber for windowsscope:neversion:11.8

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.4.1

Trust: 0.3

vendor:ciscomodel:telepresence profile series ce8.2.2scope:neversion: -

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:13.1.0.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.0

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:14.0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.10

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.3

Trust: 0.3

vendor:ciscomodel:ace30 application control engine modulescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:5.0.28

Trust: 0.3

vendor:ciscomodel:edge digital media player 1.6rb5scope:neversion:300

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.12

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:69450

Trust: 0.3

vendor:ciscomodel:telepresence isdn gateway msescope:eqversion:83210

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.4

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.4.0.0

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.6.1.0

Trust: 0.3

vendor:ciscomodel:jabber software development kitscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:neversion:8.4

Trust: 0.3

vendor:ciscomodel:uc integration for microsoft lyncscope:neversion:11.6.3

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.4.5.0

Trust: 0.3

vendor:ibmmodel:rational application developer for websphere softwarescope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:neversion:11.6.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.404

Trust: 0.3

vendor:ciscomodel:telepresence system tx1310scope:neversion:6.1

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:neversion:1.4.2

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:eqversion:5.1.151.05

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:neversion:7.3

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:6.4.1.2

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.3

Trust: 0.3

vendor:hpmodel:performance center patchscope:eqversion:12.01

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.4

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.33

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5

Trust: 0.3

vendor:ciscomodel:telepresence mx series tc7.3.7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ip interoperability and collaboration systemscope:neversion:5.0(1)

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.5

Trust: 0.3

vendor:ciscomodel:spa122 analog telephone adapter with routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:neversion:50003.5.12.23

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:eqversion:50003.4.2.0

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:uc integration for microsoft lyncscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.2

Trust: 0.3

vendor:ibmmodel:openssh for gpfs for windowsscope:eqversion:3.5

Trust: 0.3

vendor:ibmmodel:db2® direct advanced editionscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:db2® enterprise server editionscope:eqversion:9.7

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.401

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.8

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.5

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.15

Trust: 0.3

vendor:ibmmodel:bigfix remote controlscope:neversion:9.1.3

Trust: 0.3

vendor:ciscomodel:unity expressscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endianscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.7

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.21

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:13000

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.1

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.4

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for imagesscope:eqversion:7.1.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.7

Trust: 0.3

vendor:ciscomodel:tandberg codian isdn gatewayscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1165239scope: - version: -

Trust: 0.3

vendor:ciscomodel:jabber guestscope:neversion:11

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.9

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:neversion:12.1.2

Trust: 0.3

vendor:ciscomodel:digital media manager 5.3.6 rb3scope:neversion: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.4.4.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.4

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:44000

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorsscope:neversion:1901.3

Trust: 0.3

vendor:ciscomodel:prime network services controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorsscope:eqversion:1900

Trust: 0.3

vendor:ciscomodel:asr seriesscope:neversion:500021.2

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1tscope: - version: -

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.5

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:11.52

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.5.0.12

Trust: 0.3

vendor:ciscomodel:ons series multiservice provisioning platformsscope:neversion:1545410.7

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.2

Trust: 0.3

vendor:ciscomodel:telepresence system seriesscope:eqversion:30000

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.1.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:neversion:13.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:13.1

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:7.1.1.19

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2.3

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:ciscomodel:hosted collaboration mediation fulfillmentscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.19

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:2.4.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1.2

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.25

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:7.1.0.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.6

Trust: 0.3

vendor:ciscomodel:webex meetings server multimedia platformscope:eqversion:-0

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.7

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.4.1

Trust: 0.3

vendor:ciscomodel:unified ip conference phone 10.3.1sr4scope:neversion:8831

Trust: 0.3

vendor:ciscomodel:prime network registrarscope:neversion:8.3.5

Trust: 0.3

vendor:ibmmodel:db2® express editionscope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:series stackable managed switchesscope:eqversion:5000

Trust: 0.3

vendor:hpmodel:performance center patchscope:eqversion:12.501

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.5

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified intelligent contact management enterprisescope:neversion:11.6.1

Trust: 0.3

vendor:ciscomodel:stealthwatch flowcollector netflowscope:eqversion:0

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:12.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.2

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.4.3.0

Trust: 0.3

vendor:ciscomodel:ucs managerscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.3.2

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:5.0.1

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:neversion:12.1.2

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.11

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.2

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:2.7.11

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:neversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:video surveillance 4300e and 4500e high-definition ip camerasscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified attendant console department editionscope:eqversion:0

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:ip series phonesscope:eqversion:78000

Trust: 0.3

vendor:netappmodel:oncommand api servicesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:27000

Trust: 0.3

vendor:ciscomodel:onepk all-in-one virtual machinescope:eqversion:0

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:neversion:2.7.13

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:11.6.3

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.4

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.6

Trust: 0.3

vendor:ibmmodel:db2 direct advanced editionscope:eqversion:9.7

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.6.0.1

Trust: 0.3

vendor:ciscomodel:industrial routerscope:eqversion:9100

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.1

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:db2® workgroup server editionscope:eqversion:10.5

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:14.0

Trust: 0.3

vendor:ibmmodel:db2 direct standard editionscope:eqversion:10.5

Trust: 0.3

vendor:ciscomodel:unified intelligence centerscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.3

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:12.013

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:11

Trust: 0.3

vendor:ciscomodel:video distribution suite for internet streamingscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:neversion:13006.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:neversion:6.7.0.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.7.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm system zscope:eqversion:7

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.116

Trust: 0.3

vendor:ciscomodel:cloupia unified infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.3

vendor:ibmmodel:db2® advanced enterprise server editionscope:eqversion:10.5

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system i®scope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:neversion:11006.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2.1

Trust: 0.3

vendor:ciscomodel:agent desktop for cisco unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:packaged contact center enterprisescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:8.0.0.0

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:70000

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.6

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:telepresence sx series tc7.3.7scope:neversion: -

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.5

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.4

Trust: 0.3

vendor:ibmmodel:db2® connect? application server editionscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.1

Trust: 0.3

vendor:ciscomodel:nac appliance clean access serverscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:neversion:1.1.1.4

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:video distribution suite for internet streamingscope:neversion:4.003(002)

Trust: 0.3

vendor:ciscomodel:firesight system softwarescope:neversion:6.1.0.1

Trust: 0.3

vendor:ciscomodel:webex meetings for windows phonescope:eqversion:80

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.1

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect analog telephone adapterscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.3

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.1.1

Trust: 0.3

vendor:ciscomodel:prime optical for service providersscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:smart carescope:eqversion:0

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:8

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.4.6.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:neversion:5.3.1.11

Trust: 0.3

vendor:ciscomodel:universal small cell cloudbase factory recovery root filesystemscope:eqversion:2.99.4

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:neversion:12.1.2

Trust: 0.3

vendor:ciscomodel:edge digital media player 1.2rb1.0.3scope:neversion:340

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.5

Trust: 0.3

vendor:ciscomodel:network performance analysisscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.1.1

Trust: 0.3

vendor:netappmodel:manageability sdkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip conference phone for third-party call controlscope:eqversion:88310

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:60006.2.19

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.3

Trust: 0.3

vendor:ibmmodel:sonasscope:neversion:1.5.2.5

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.1

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:webex meetings for windows phonescope:neversion:82.8

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.2.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.2

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.4

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.6.1

Trust: 0.3

vendor:ibmmodel:spectrum controlscope:eqversion:5.2.10

Trust: 0.3

vendor:ciscomodel:universal small cell cloudbase factory recovery root filesystemscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.7

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:2.3.0

Trust: 0.3

vendor:ciscomodel:secure access control systemscope:neversion:5.8.0.32.7

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.0

Trust: 0.3

vendor:ciscomodel:telepresence integrator c series ce8.2.2scope:neversion: -

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment intirim fixscope:eqversion:5.133

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:5.3

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.9

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.2

Trust: 0.3

vendor:ciscomodel:webex meetings client hostedscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.13

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:14.0

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:neversion:6.1.140

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.8

Trust: 0.3

vendor:hpmodel:performance center patchscope:eqversion:11.523

Trust: 0.3

vendor:ibmmodel:security virtual server protection for vmwarescope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:stealthwatch udp directorscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.2.2

Trust: 0.3

vendor:ciscomodel:intrusion prevention system solutionsscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:4.6

Trust: 0.3

vendor:ciscomodel:unified ip conference phonescope:eqversion:88310

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.3

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.6

Trust: 0.3

vendor:ciscomodel:nexus series switches 5.2.8scope:neversion:6000

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.3

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.14

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:3.1.0.4

Trust: 0.3

vendor:hpmodel:performance centerscope:eqversion:12.53

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:42.50

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.0

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.9

Trust: 0.3

vendor:ibmmodel:communications server for windowsscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:jabber client framework componentsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime ip expressscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified sip proxy softwarescope:neversion:10

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.4

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:oraclemodel:mysql workbenchscope:eqversion:6.1.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2.1

Trust: 0.3

vendor:ciscomodel:security managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:netflow generation appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber for macscope:neversion:11.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.403

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:9.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.6

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.4.3

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.4

Trust: 0.3

vendor:hpmodel:performance center patchscope:eqversion:12.202

Trust: 0.3

vendor:ciscomodel:unified sip proxy softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:99510

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.1.3

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:89450

Trust: 0.3

vendor:ciscomodel:telepresence supervisor msescope:eqversion:80500

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:eqversion:7.1.1.20280.6

Trust: 0.3

vendor:ibmmodel:db2® advanced workgroup server editionscope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:telepresence server and msescope:neversion:701087104.4

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.10

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.6

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.12

Trust: 0.3

vendor:ciscomodel:ucs series and series fabric interconnectsscope:eqversion:620063000

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:6.2.2

Trust: 0.3

vendor:ciscomodel:webex meeting centerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.11

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:12.0

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:2.0.4

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:6.6.0.0

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:41.32

Trust: 0.3

vendor:ibmmodel:db2® direct standard editionscope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:java sdkscope:neversion:8.0.4.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.0

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.1

Trust: 0.3

vendor:ciscomodel:netflow generation appliancescope:neversion:1.1(1)

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.6

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.8

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.13

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.6

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:6.5.2

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2.2

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.6

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:4.71

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.11

Trust: 0.3

vendor:ibmmodel:db2® connect? application server editionscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:db2® express editionscope:eqversion:10.5

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.2

Trust: 0.3

vendor:ciscomodel:socialminerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:2.1.1.3-6513

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.28

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:8.5.5

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:11.522

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.3.2.0

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:42.03

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:intracerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:video surveillance series high-definition ip camerasscope:neversion:40002.9

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.29

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.18

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.6

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:eqversion:5.1.1051.07

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:2.0.3

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.4.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.1.1

Trust: 0.3

vendor:ciscomodel:jabber for windowsscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:oss support toolsscope:eqversion:8.8.15.7.15

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:41.30

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.1.3

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:neversion:13.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.0

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:12.534

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime infrastructurescope:neversion:3.2

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:video surveillance 4300e and 4500e high-definition ip camerasscope:neversion:2.9

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5

Trust: 0.3

vendor:ibmmodel:db2 direct advanced editionscope:eqversion:10.5

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.2.3

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:3.1.0.23

Trust: 0.3

vendor:ciscomodel:computer telephony integration object serverscope:neversion:11.6.1

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:11000

Trust: 0.3

vendor:ciscomodel:telepresence sx seriesscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.0

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty media andscope:eqversion:3103200

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.24

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.6

Trust: 0.3

vendor:ciscomodel:content security appliance update serversscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:videoscape anyres livescope:neversion:9.7.2

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:99710

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:10.2.3

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.6

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.9

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system i®scope:eqversion:10.5

Trust: 0.3

vendor:ibmmodel:java sdkscope:neversion:7.0.10.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.7

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.2.3

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.0.2

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.4

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:firesight system softwarescope:neversion:5.4.1.9

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.13

Trust: 0.3

vendor:ciscomodel:universal small cell iuhscope:neversion:3.17.3

Trust: 0.3

vendor:ciscomodel:ata analog telephone adaptorscope:eqversion:1870

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.1.1

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.2

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:42.44

Trust: 0.3

vendor:ciscomodel:ios and cisco ios xe softwarescope:neversion:16.4

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:neversion:500-326.1

Trust: 0.3

vendor:f5model:big-iq adcscope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:unity expressscope:neversion:10

Trust: 0.3

vendor:ibmmodel:mobile connectscope:eqversion:6.1.5.2

Trust: 0.3

vendor:hpmodel:performance centerscope:eqversion:12.20

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.4

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.4.1

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:3000

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:5.1.8

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:neversion:1.2.0.15

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:13.1

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:13.0

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:2.0.6

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:neversion:10006.1

Trust: 0.3

vendor:ciscomodel:telepresence isdn gatewayscope:eqversion:32410

Trust: 0.3

vendor:ibmmodel:db2® advanced workgroup server editionscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:telepresence mcuscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:13.0

Trust: 0.3

vendor:ciscomodel:series smart plus switchesscope:eqversion:2200

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.3

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.0.0

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fiscope:eqversion:2.4.0.4

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.21

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:1000v0

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:7.0.9.60

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.5.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.5

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.6

Trust: 0.3

vendor:ciscomodel:virtual security gatewayscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.7

Trust: 0.3

vendor:ibmmodel:db2® connect? enterprise editionscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:13.0

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.5.2

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.5

Trust: 0.3

vendor:ciscomodel:telepresence tx9000 seriesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:3.2.0.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.2

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:43000

Trust: 0.3

vendor:ciscomodel:telepresence system seriesscope:neversion:30006.1

Trust: 0.3

vendor:hpmodel:performance center agentscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:eqversion:70003.4.2.0

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:12.01

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:7

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.4

Trust: 0.3

vendor:ciscomodel:unity connectionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:loadrunner patch4scope:eqversion:11.0

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.4.6

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.1.0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.12

Trust: 0.3

vendor:ciscomodel:security managerscope:neversion:4.13

Trust: 0.3

vendor:ciscomodel:ucs b-series blade serversscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.7

Trust: 0.3

vendor:ciscomodel:ucs standalone c-series rack server integrated management contscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:communications server for linuxscope:eqversion:6.4

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.0.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:neversion:5.3.2.5

Trust: 0.3

vendor:netappmodel:e-series santricity storage managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:spectrum controlscope:eqversion:5.2.9

Trust: 0.3

vendor:ciscomodel:telepresence integrator c seriesscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.3

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:12.53

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.6.0.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.32

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-iq cloud and orchestrationscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:enterprise content delivery systemscope:neversion:2.6.9

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:60000

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:6.5.1

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:7

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:11.6.1

Trust: 0.3

vendor:ciscomodel:mds series multilayer switches 5.2.8scope:neversion:9000

Trust: 0.3

vendor:ciscomodel:series digital media players 5.4.1 rb4scope:neversion:4300

Trust: 0.3

vendor:ciscomodel:ucs standalone c-series rack server integrated management contscope:neversion:-3.0

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6.3

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.2.1

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.1.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.3

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:4

Trust: 0.3

vendor:ciscomodel:ios and cisco ios xe softwarescope:neversion:16.1

Trust: 0.3

vendor:ciscomodel:prime networkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence tx9000 seriesscope:neversion:6.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:4.4.2.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.1

Trust: 0.3

vendor:ciscomodel:prime performance managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system z®scope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:smart net total care local collector appliancescope:eqversion:-0

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.12

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.4.2

Trust: 0.3

vendor:ibmmodel:db2® enterprise server editionscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:neversion:15.8.9

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:6.5.2

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.4.5

Trust: 0.3

vendor:hpmodel:integrated lights-outscope:eqversion:41.13

Trust: 0.3

vendor:ciscomodel:nexus series fabric switches aci modescope:eqversion:9000-0

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.12

Trust: 0.3

vendor:ciscomodel:prime performance manager sp1611scope:neversion:1.7

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.22

Trust: 0.3

vendor:ciscomodel:unified ip phone 9.3 sr3scope:neversion:6901

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.6

Trust: 0.3

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.16

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.23

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.10

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:13.0.1

Trust: 0.3

vendor:ciscomodel:telepresence server and msescope:eqversion:701087100

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:12.2

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.1.3

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.3

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:mds series multilayer switchesscope:neversion:90006.2.19

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:270015.5(3)

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:11.521

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.30

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.4

Trust: 0.3

vendor:ibmmodel:spectrum controlscope:eqversion:5.2.11

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.1

Trust: 0.3

vendor:ciscomodel:telepresence server on virtual machinescope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.2

Trust: 0.3

vendor:ciscomodel:webex meetings for androidscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational application developer for websphere softwarescope:eqversion:9.5

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:hpmodel:performance centerscope:eqversion:12.00

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.2

Trust: 0.3

vendor:netappmodel:snap creator frameworkscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.4

Trust: 0.3

vendor:ciscomodel:nexus series switches 5.2.8scope:neversion:5000

Trust: 0.3

vendor:ciscomodel:digital media manager 5.4.1 rb4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:unified workforce optimization quality management solutionscope:eqversion:-0

Trust: 0.3

vendor:ciscomodel:telepresence integrator c series tc7.3.7scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.3

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.2

Trust: 0.3

vendor:ibmmodel:db2® advanced workgroup server editionscope:eqversion:10.5

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.13

Trust: 0.3

vendor:ciscomodel:spa122 analog telephone adapter with routerscope:neversion:1.4.2

Trust: 0.3

vendor:ciscomodel:cloud object storagescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.4

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:2.7.10

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.5

Trust: 0.3

vendor:ibmmodel:rrdiscope:eqversion:2.0.1

Trust: 0.3

vendor:hpmodel:performance center agentscope:eqversion:11

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.14

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.2.4

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3

Trust: 0.3

vendor:f5model:iworkflowscope:eqversion:2.2

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.4

Trust: 0.3

vendor:ibmmodel:java sdkscope:neversion:6.1.8.41

Trust: 0.3

vendor:opensslmodel:project opensslscope:neversion:1.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6

Trust: 0.3

vendor:ciscomodel:unified intelligent contact management enterprisescope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:14.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.1

Trust: 0.3

vendor:ciscomodel:application and content networking systemscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.2

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for iosscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.2

Trust: 0.3

vendor:ciscomodel:ace application control enginescope:eqversion:47100

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oss support toolsscope:neversion:8.15.17.3.14

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for mac osscope:eqversion:x0

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:11.6

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.2

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.0

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:12.1.1

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:6.4.1.2

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images buildscope:neversion:7.1.1.20290.1

Trust: 0.3

vendor:ciscomodel:prime infrastructure plug and play standalone gatewayscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.2

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:neversion:13.0

Trust: 0.3

vendor:ciscomodel:virtual security gatewayscope:neversion:2.1.6

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:50006.2.19

Trust: 0.3

vendor:f5model:lineratescope:eqversion:2.5

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.3

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.4

Trust: 0.3

vendor:ciscomodel:telepresence conductorscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.3

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:10.2.1

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1uscope:neversion: -

Trust: 0.3

vendor:ciscomodel:jabber for macscope:eqversion:0

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.5.2.2

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:neversion:3.4.7

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.1

Trust: 0.3

vendor:ciscomodel:prime network registrarscope:neversion:9.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.3

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:6.0.0.0

Trust: 0.3

vendor:ibmmodel:cognos metrics managerscope:eqversion:10.2.2

Trust: 0.3

vendor:ciscomodel:jabber for iphone and ipadscope:neversion:11.8

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:12.1

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:12.503

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.2

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:6.1.8.35

Trust: 0.3

vendor:ibmmodel:db2® connect? unlimited edition for system z®scope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:neversion:x8.8.3

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.1.3

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.16

Trust: 0.3

vendor:ibmmodel:db2® connect? application server editionscope:eqversion:9.7

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.4.1

Trust: 0.3

vendor:f5model:traffix sdcscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:series digital media players 5.4.1 rb4scope:neversion:4400

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.5.0

Trust: 0.3

vendor:ciscomodel:multicast managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:270016.3

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:14.0

Trust: 0.3

vendor:ibmmodel:sterling b2b integratorscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.4.1

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for iosscope:neversion:4.0.7

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:ciscomodel:secure access control systemscope:neversion:5.8.0.32.8

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:neversion:12.1.2

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.3

Trust: 0.3

vendor:ciscomodel:webex node for mcsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence mcuscope:neversion:4.5(1.89)

Trust: 0.3

vendor:hpmodel:performance centerscope:eqversion:12.01

Trust: 0.3

vendor:ciscomodel:management appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for windowsscope:neversion:4.0.7

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.4

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:2.7.12

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.2

Trust: 0.3

vendor:ibmmodel:db2® workgroup server editionscope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:videoscape anyres livescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:video surveillance ptz ip camerasscope:eqversion:0

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:11.52.1

Trust: 0.3

vendor:ibmmodel:db2 direct standard editionscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.6.3

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.31

Trust: 0.3

vendor:f5model:iworkflowscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:telepresence serial gateway seriesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:sterling connect:direct for hp nonstopscope:eqversion:3.6

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:neversion:8204.4

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.3

Trust: 0.3

vendor:ibmmodel:db2® connect? enterprise editionscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.1

Trust: 0.3

vendor:redhatmodel:enterprise linux for powerscope:eqversion:97

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.13

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.4.1

Trust: 0.3

vendor:hpmodel:loadrunner patchscope:eqversion:11.523

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5

Trust: 0.3

vendor:netappmodel:ontap select deploy administration toolscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:db2® advanced enterprise server editionscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.400

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:89610

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:neversion:x8.8.3

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.5

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.12

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:6.3

Trust: 0.3

vendor:f5model:traffix sdcscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:prime networkscope:neversion:431

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:500-320

Trust: 0.3

vendor:ciscomodel:unified attendant console enterprise editionscope:eqversion:0

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.14

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.26

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:7.1.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.4

Trust: 0.3

vendor:ciscomodel:network analysis module 6.2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:telepresence system ex series ce8.2.2scope:neversion: -

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.3

Trust: 0.3

vendor:ciscomodel:prime data center network managerscope:eqversion: -

Trust: 0.3

vendor:ciscomodel:mxe series media experience enginesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:universal small cell cloudbase factory recovery root filesystemscope:neversion:3.17.3

Trust: 0.3

vendor:ciscomodel:videoscape control suitescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:neversion:13.0

Trust: 0.3

vendor:ciscomodel:tandberg codian msescope:eqversion:83200

Trust: 0.3

vendor:ciscomodel:ip series phones vpn featurescope:eqversion:8800-0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:7.0.0.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.9

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1.3

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.7

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:2.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.1.2

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.27

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.17

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.18

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:13.2.0.0

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.3

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:neversion:7.6.406-3402.103

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:neversion:13.0.0

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:12.1.3.4

Trust: 0.3

vendor:ciscomodel:unified meetingplace 8.6mr1scope:neversion: -

Trust: 0.3

vendor:f5model:traffix sdcscope:eqversion:4.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.4.1

Trust: 0.3

vendor:ciscomodel:telepresence mx seriesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:tapi service providerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:500-370

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:neversion:70002.9

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.0.2

Trust: 0.3

vendor:hpmodel:loadrunnerscope:eqversion:12.02

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.0

Trust: 0.3

vendor:ciscomodel:spa525g 5-line ip phonescope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.5

Trust: 0.3

vendor:ciscomodel:telepresence profile seriesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:sonasscope:eqversion:1.5.1.0

Trust: 0.3

vendor:ciscomodel:secure access control systemscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.6.22

Trust: 0.3

vendor:ibmmodel:db2® advanced workgroup server editionscope:eqversion:9.7

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:3.4

Trust: 0.3

vendor:ciscomodel:unified ip series phonesscope:eqversion:79000

Trust: 0.3

vendor:ciscomodel:unified ip conference phone for third-party call control 9.3 sr3scope:neversion:8831

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect analog telephone adapterscope:neversion:1.4.2

Trust: 0.3

vendor:ciscomodel:nexus series fabric switches aci modescope:neversion:9000-0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.6

Trust: 0.3

vendor:ciscomodel:visual quality experience tools serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:virtualization experience media editionscope:eqversion:0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.1

Trust: 0.3

vendor:netappmodel:oncommand insightscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:6.0.16.35

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1157986scope: - version: -

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:13.1

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:5.2.7

Trust: 0.3

vendor:ibmmodel:db2® enterprise server editionscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.3

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:eqversion:0

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:neversion:70003.5.12.23

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.3

Trust: 0.3

vendor:ciscomodel:firesight system softwarescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fiscope:eqversion:2.3.0.4

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.1.0

Trust: 0.3

vendor:oraclemodel:mysqlscope:eqversion:5.7.15

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.1.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.6.0

Trust: 0.3

vendor:ciscomodel:unified meetingplacescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings client hosted t32scope:neversion: -

Trust: 0.3

vendor:ibmmodel:websphere mqscope:eqversion:6.0.0.0

Trust: 0.3

vendor:ibmmodel:security virtual server protection for vmwarescope:eqversion:1.1.1

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:neversion:11.6

Trust: 0.3

vendor:pythonmodel:software foundation pythonscope:eqversion:2.7

Trust: 0.3

vendor:pexipmodel:infinityscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images system editionscope:eqversion:x7.1.1.0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:neversion:2.6.1.30

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.5

Trust: 0.3

vendor:hpmodel:real user monitor software seriesscope:eqversion:9.30

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.13

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.402

Trust: 0.3

vendor:mcafeemodel:epolicy orchestratorscope:eqversion:5.3.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.2

Trust: 0.3

sources: BID: 92630 // NVD: CVE-2016-2183

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2183
value: HIGH

Trust: 1.0

VULHUB: VHN-91002
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-2183
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-2183
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-91002
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2183
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-91002 // VULMON: CVE-2016-2183 // NVD: CVE-2016-2183

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-91002 // NVD: CVE-2016-2183

THREAT TYPE

network

Trust: 0.3

sources: BID: 92630

TYPE

Design Error

Trust: 0.3

sources: BID: 92630

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-91002

PATCH

title:Red Hat: Moderate: OpenShift Container Platform 4.5.13 openshift-enterprise-console-container security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203842 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Quay 3.0.2 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191245 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: java-1.8.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170462 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: python security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182123 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.1.18 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192859 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 3.11 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200451 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20172708 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20172709 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20172710 - Security Advisory

Trust: 0.1

title:IBM: Security Bulletin: IBM InfoSphere Information server is vulnerable to SWEET32 Birthday attack (CVE-2016-2183)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=cce09482cb916969f209c63d0a7b2ddd

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerability in Python affects IBM OS Images for Red Hat Linux Systemsurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=7309727c470ac517c08efdea198e8b5c

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.18 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173240 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.6.16 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210308 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.18 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173239 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173113 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173114 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: nss vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3270-1

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2016-2183

Trust: 0.1

title:Red Hat: CVE-2016-2183url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-2183

Trust: 0.1

title:Ubuntu Security Notice: nss vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3372-1

Trust: 0.1

title:Red Hat: Critical: java-1.6.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170338 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: java-1.7.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170337 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20161940 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: java-1.6.0-sun security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170177 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: java-1.7.1-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170336 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: java-1.8.0-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170180 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: java-1.7.0-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170269 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: java-1.7.0-oracle security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170176 - Security Advisory

Trust: 0.1

title:Symantec Security Advisories: SA133 : Sweet32 Birthday Attack against DES, 3DES, and Blowfishurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=cb3570c539f6d95e2afa1894711091f0

Trust: 0.1

title:Red Hat: Critical: java-1.8.0-oracle security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170175 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-1

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3198-1

Trust: 0.1

title:Fortinet Security Advisories: Sweet32 Birthday attack in TLSurl:https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=FG-IR-17-173

Trust: 0.1

title:Ubuntu Security Notice: openjdk-7 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3194-1

Trust: 0.1

title:Ubuntu Security Notice: openssl regressionurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-2

Trust: 0.1

title:Ubuntu Security Notice: openjdk-8 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3179-1

Trust: 0.1

title:Tenable Security Advisories: [R1] LCE 5.0.1 Fixes Two Third-party Library Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2017-09

Trust: 0.1

title:Red Hat: Moderate: java-1.7.1-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171216 - Security Advisory

Trust: 0.1

title:Arch Linux Advisories: [ASA-201609-24] lib32-openssl: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-24

Trust: 0.1

title:Arch Linux Advisories: [ASA-201609-23] openssl: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-23

Trust: 0.1

title:Amazon Linux AMI: ALAS-2016-755url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-755

Trust: 0.1

title:Amazon Linux AMI: ALAS-2017-791url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2017-791

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2016-2183

Trust: 0.1

title:shadowsocks-perlurl:https://github.com/zhou0/shadowsocks-perl

Trust: 0.1

title:Cipher-TLS-removing-vulnerabilities-from-openvasurl:https://github.com/jeffaizenbr/Cipher-TLS-removing-vulnerabilities-from-openvas

Trust: 0.1

title: - url:https://github.com/aous-al-salek/crypto

Trust: 0.1

title:lineBOTurl:https://github.com/kampfcl3/lineBOT

Trust: 0.1

sources: VULMON: CVE-2016-2183

EXTERNAL IDS

db:NVDid:CVE-2016-2183

Trust: 2.3

db:BIDid:92630

Trust: 1.4

db:MCAFEEid:SB10197

Trust: 1.4

db:PACKETSTORMid:142756

Trust: 1.1

db:ICS CERTid:ICSMA-18-058-02

Trust: 1.1

db:SECTRACKid:1036696

Trust: 1.1

db:PULSESECUREid:SA40312

Trust: 1.1

db:BIDid:95568

Trust: 1.1

db:TENABLEid:TNS-2017-09

Trust: 1.1

db:TENABLEid:TNS-2016-21

Trust: 1.1

db:TENABLEid:TNS-2016-20

Trust: 1.1

db:TENABLEid:TNS-2016-16

Trust: 1.1

db:MCAFEEid:SB10310

Trust: 1.1

db:MCAFEEid:SB10186

Trust: 1.1

db:MCAFEEid:SB10215

Trust: 1.1

db:MCAFEEid:SB10171

Trust: 1.1

db:SIEMENSid:SSA-412672

Trust: 1.1

db:JUNIPERid:JSA10759

Trust: 1.1

db:EXPLOIT-DBid:42091

Trust: 1.1

db:PACKETSTORMid:140708

Trust: 0.2

db:PACKETSTORMid:143244

Trust: 0.2

db:PACKETSTORMid:141555

Trust: 0.2

db:PACKETSTORMid:144869

Trust: 0.2

db:PACKETSTORMid:145017

Trust: 0.2

db:PACKETSTORMid:141353

Trust: 0.2

db:PACKETSTORMid:161320

Trust: 0.1

db:PACKETSTORMid:148410

Trust: 0.1

db:PACKETSTORMid:141352

Trust: 0.1

db:PACKETSTORMid:143970

Trust: 0.1

db:PACKETSTORMid:150303

Trust: 0.1

db:PACKETSTORMid:140718

Trust: 0.1

db:PACKETSTORMid:141100

Trust: 0.1

db:PACKETSTORMid:140473

Trust: 0.1

db:PACKETSTORMid:141111

Trust: 0.1

db:PACKETSTORMid:141354

Trust: 0.1

db:PACKETSTORMid:144865

Trust: 0.1

db:PACKETSTORMid:143549

Trust: 0.1

db:PACKETSTORMid:140725

Trust: 0.1

db:PACKETSTORMid:142340

Trust: 0.1

db:PACKETSTORMid:156451

Trust: 0.1

db:PACKETSTORMid:140084

Trust: 0.1

db:PACKETSTORMid:147581

Trust: 0.1

db:PACKETSTORMid:152978

Trust: 0.1

db:PACKETSTORMid:140977

Trust: 0.1

db:PACKETSTORMid:154650

Trust: 0.1

db:PACKETSTORMid:145018

Trust: 0.1

db:PACKETSTORMid:159431

Trust: 0.1

db:CNNVDid:CNNVD-201608-448

Trust: 0.1

db:VULHUBid:VHN-91002

Trust: 0.1

db:VULMONid:CVE-2016-2183

Trust: 0.1

db:PACKETSTORMid:144134

Trust: 0.1

db:PACKETSTORMid:169633

Trust: 0.1

sources: VULHUB: VHN-91002 // VULMON: CVE-2016-2183 // BID: 92630 // PACKETSTORM: 141353 // PACKETSTORM: 140708 // PACKETSTORM: 144869 // PACKETSTORM: 145017 // PACKETSTORM: 143244 // PACKETSTORM: 141555 // PACKETSTORM: 144134 // PACKETSTORM: 169633 // NVD: CVE-2016-2183

REFERENCES

url:https://access.redhat.com/security/cve/cve-2016-2183

Trust: 1.6

url:https://access.redhat.com/errata/rhsa-2018:2123

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1021697

Trust: 1.4

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995039

Trust: 1.4

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.4

url:https://access.redhat.com/articles/2548661

Trust: 1.4

url:https://sweet32.info/

Trust: 1.4

url:https://www.openssl.org/blog/blog/2016/08/24/sweet32/

Trust: 1.4

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10197

Trust: 1.3

url:https://security.gentoo.org/glsa/201707-01

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2017-0338.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2017-0462.html

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2708

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:3113

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:3239

Trust: 1.2

url:http://www.securitytracker.com/id/1036696

Trust: 1.1

url:http://www.securityfocus.com/archive/1/539885/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/540341/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded

Trust: 1.1

url:http://seclists.org/fulldisclosure/2017/may/105

Trust: 1.1

url:http://seclists.org/fulldisclosure/2017/jul/31

Trust: 1.1

url:http://www.securityfocus.com/archive/1/541104/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/542005/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded

Trust: 1.1

url:https://seclists.org/bugtraq/2018/nov/21

Trust: 1.1

url:https://www.exploit-db.com/exploits/42091/

Trust: 1.1

url:http://www.securityfocus.com/bid/92630

Trust: 1.1

url:http://www.securityfocus.com/bid/95568

Trust: 1.1

url:http://www.debian.org/security/2016/dsa-3673

Trust: 1.1

url:https://security.gentoo.org/glsa/201612-16

Trust: 1.1

url:https://security.gentoo.org/glsa/201701-65

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2017-0336.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2017-0337.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:1216

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:2709

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:2710

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:3114

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:3240

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1245

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:2859

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2020:0451

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3087-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3087-2

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3179-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3194-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3198-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3270-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3372-1

Trust: 1.1

url:https://www.ietf.org/mail-archive/web/tls/current/msg04560.html

Trust: 1.1

url:http://packetstormsecurity.com/files/142756/ibm-informix-dynamic-server-dll-injection-code-execution.html

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21991482

Trust: 1.1

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html

Trust: 1.1

url:http://www.splunk.com/view/sp-caaapsv

Trust: 1.1

url:http://www.splunk.com/view/sp-caaapue

Trust: 1.1

url:https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/

Trust: 1.1

url:https://bto.bluecoat.com/security-advisory/sa133

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1369383

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.1

url:https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05302448

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05309984

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05323116

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05349499

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05356388

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05369403

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05369415

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05385680

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390849

Trust: 1.1

url:https://ics-cert.us-cert.gov/advisories/icsma-18-058-02

Trust: 1.1

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40312

Trust: 1.1

url:https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/

Trust: 1.1

url:https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20160915-0001/

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20170119-0001/

Trust: 1.1

url:https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/km03158613

Trust: 1.1

url:https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/km03286178

Trust: 1.1

url:https://support.f5.com/csp/article/k13167034

Trust: 1.1

url:https://wiki.opendaylight.org/view/security_advisories

Trust: 1.1

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24

Trust: 1.1

url:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008

Trust: 1.1

url:https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujan2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.1

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.1

url:https://www.sigsac.org/ccs/ccs2016/accepted-papers/

Trust: 1.1

url:https://www.tenable.com/security/tns-2016-16

Trust: 1.1

url:https://www.tenable.com/security/tns-2016-20

Trust: 1.1

url:https://www.tenable.com/security/tns-2016-21

Trust: 1.1

url:https://www.tenable.com/security/tns-2017-09

Trust: 1.1

url:https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html

Trust: 1.1

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10759

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05302448

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05369403

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05369415

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05385680

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05390722

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05390849

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03765en_us

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbux03725en_us

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10171

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10186

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10215

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10310

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2016-2183

Trust: 0.8

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05369415

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://github.com/python/cpython/commit/03d13c0cbfe912eb0f9b9a02987b9e569f25fe19

Trust: 0.3

url:https://github.com/python/cpython/commit/fa53dbdec818b0f2a0e22ca12a49d83ec948fc91

Trust: 0.3

url:https://www.openssl.org/news/changelog.html#x1

Trust: 0.3

url:http://openssl.org/

Trust: 0.3

url:https://kb.netapp.com/support/index?page=content&id=9010102&actp=rss

Trust: 0.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160927-openssl

Trust: 0.3

url:https://python-security.readthedocs.io/vuln/cve-2016-2183_sweet32_attack_des_3des.html

Trust: 0.3

url:https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03765en_us

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05323116

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc

Trust: 0.3

url:https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilities-in-openssl-affect-ibm-worklight-and-ibm-mobilefirst-platform-foundation-2/

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024394

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=isg3t1024401

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024648

Trust: 0.3

url:https://github.com/python/cpython/commit/d988f429fe43808345812ef63dfa8da170c61871

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1021643

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html

Trust: 0.3

url:https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf

Trust: 0.3

url:https://www.pexip.com/sites/pexip/files/pexip_security_bulletin_2016-10-07.pdf

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21991896

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009585

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009586

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=ssg1s1009648

Trust: 0.3

url:https://www-01.ibm.com/support/docview.wss?uid=swg21985392

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21991724

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21991894

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21992427

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21992681

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21992898

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21993061

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21993601

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21993856

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21993875

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21994375

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21994927

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995057

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995129

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995392

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995393

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995658

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995691

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995886

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995922

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21997194

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg22000587

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-9788

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-9788

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-3253

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-5546

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-3261

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-5549

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-3241

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-3231

Trust: 0.2

url:https://developer.ibm.com/javasdk/support/security-vulnerabilities/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-5552

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-3252

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-3272

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-5548

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2017-9798

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-9798

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10759

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05302448

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05369403

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05369415

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05385680

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05390722

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05390849

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbgn03765en_us

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbux03725en_us

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10171

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10186

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10197

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10215

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10310

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3259

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5548

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5549

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3253

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3252

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3259

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5552

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3241

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5546

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3261

Trust: 0.1

url:https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12617

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12615

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12615

Trust: 0.1

url:https://access.redhat.com/articles/3227901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12617

Trust: 0.1

url:https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/

Trust: 0.1

url:https://access.redhat.com/articles/3229231

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.4

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3514

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3512

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3544

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3511

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2183

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3289

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3260

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3260

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3253

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3544

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3526

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5546

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5552

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3261

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3514

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3511

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3509

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3241

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3509

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3539

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3533

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3533

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5549

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3512

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3252

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3272

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3185

Trust: 0.1

url:https://access.redhat.com/documentation/en/red-hat-jboss-core-services/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3185

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.apachehttp&downloadtype=securitypatches&version=2.4.23

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6306

Trust: 0.1

url:https://www.openssl.org/news/secadv/20160922.txt

Trust: 0.1

url:https://www.openssl.org/policies/secpolicy.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6303

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6302

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2182

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6305

Trust: 0.1

url:https://sweet32.info)

Trust: 0.1

url:https://www.openssl.org/policies/releasestrat.html),

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2177

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2179

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6304

Trust: 0.1

sources: VULHUB: VHN-91002 // BID: 92630 // PACKETSTORM: 141353 // PACKETSTORM: 140708 // PACKETSTORM: 144869 // PACKETSTORM: 145017 // PACKETSTORM: 143244 // PACKETSTORM: 141555 // PACKETSTORM: 144134 // PACKETSTORM: 169633 // NVD: CVE-2016-2183

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 141353 // PACKETSTORM: 144869 // PACKETSTORM: 145017 // PACKETSTORM: 141555 // PACKETSTORM: 144134

SOURCES

db:VULHUBid:VHN-91002
db:VULMONid:CVE-2016-2183
db:BIDid:92630
db:PACKETSTORMid:141353
db:PACKETSTORMid:140708
db:PACKETSTORMid:144869
db:PACKETSTORMid:145017
db:PACKETSTORMid:143244
db:PACKETSTORMid:141555
db:PACKETSTORMid:144134
db:PACKETSTORMid:169633
db:NVDid:CVE-2016-2183

LAST UPDATE DATE

2024-11-20T19:41:37.343000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-91002date:2023-02-12T00:00:00
db:VULMONid:CVE-2016-2183date:2023-02-12T00:00:00
db:BIDid:92630date:2019-02-14T11:00:00
db:NVDid:CVE-2016-2183date:2023-02-12T23:17:38.140

SOURCES RELEASE DATE

db:VULHUBid:VHN-91002date:2016-09-01T00:00:00
db:VULMONid:CVE-2016-2183date:2016-09-01T00:00:00
db:BIDid:92630date:2016-08-24T00:00:00
db:PACKETSTORMid:141353date:2017-02-28T14:19:11
db:PACKETSTORMid:140708date:2017-01-24T19:13:55
db:PACKETSTORMid:144869date:2017-11-02T23:50:49
db:PACKETSTORMid:145017date:2017-11-17T00:10:36
db:PACKETSTORMid:143244date:2017-07-05T14:40:58
db:PACKETSTORMid:141555date:2017-03-09T17:02:00
db:PACKETSTORMid:144134date:2017-09-14T19:44:18
db:PACKETSTORMid:169633date:2016-09-22T12:12:12
db:NVDid:CVE-2016-2183date:2016-09-01T00:59:00.137