ID

VAR-201611-0386


CVE

CVE-2016-5195


TITLE

Linux kernel Competitive conditional vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201610-665

DESCRIPTION

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW.". Linux kernel is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. ========================================================================== Ubuntu Security Notice USN-3106-4 October 20, 2016 linux-snapdragon vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS Summary: The system could be made to run programs as an administrator. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: linux-image-4.4.0-1032-snapdragon 4.4.0-1032.36 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. (CVE-2016-5195, Important) * A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. 7.1) - ppc64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03707en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbgn03707en_us Version: 1 HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-03-10 Last Updated: 2017-03-10 Potential Security Impact: Remote: Increase of Privilege Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY HPE has identified two VMware security advisories affecting the HPE ConvergedSystem 700 2.0 VMware Kit. The vulnerability could be exploited remotely to allow an increase of privilege. References: - CVE-2016-5195 - VMWare vROps, VMSA-2016-0018.3 - CVE-2016-7457 - VMWare vROps, VMSA-2016-0016.1 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP ConvergedSystem 700 1.0 or 1.1 - Customers running the HPE ConvergedSystem 700 Firmware and Software Compatibility Matrix -June 2016 - HP ConvergedSystem 700 Virtualization 2.0 VMware Kit 2.0 - HPE ConvergedSystem 700 Firmware and Software Compatibility Matrix -June 2016 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2016-5195 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVE-2016-7457 10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H 8.0 (AV:N/AC:L/Au:S/C:P/I:P/A:C) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE recommends applying the following vROps patches from VMWARE to HPE ConvergedSystem 700 Firmware and Software Compatibility Matrix - June 2016 on CS700 2.0 solutions: * VMSA-2016-0016.1 <http://www.vmware.com/security/advisories/VMSA-2016-0016.html> * VMSA-2016-0018.3 <http://www.vmware.com/security/advisories/VMSA-2016-0018.html> HISTORY Version:1 (rev.1) - 10 March 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 5 client) - i386, noarch, x86_64 3. (CVE-2016-5195, Important) * It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. Bug Fix(es): * In some cases, a kernel crash or file system corruption occurred when running journal mode 'ordered'. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708) * Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2016:2098-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2098.html Issue date: 2016-10-24 CVE Names: CVE-2016-5195 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important) Red Hat would like to thank Phil Oester for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1384344 - CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-327.36.3.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.3.el7.noarch.rpm kernel-doc-3.10.0-327.36.3.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-headers-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.3.el7.x86_64.rpm perf-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-327.36.3.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.3.el7.noarch.rpm kernel-doc-3.10.0-327.36.3.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-headers-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.3.el7.x86_64.rpm perf-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-327.36.3.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.3.el7.noarch.rpm kernel-doc-3.10.0-327.36.3.el7.noarch.rpm ppc64: kernel-3.10.0-327.36.3.el7.ppc64.rpm kernel-bootwrapper-3.10.0-327.36.3.el7.ppc64.rpm kernel-debug-3.10.0-327.36.3.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm kernel-debug-devel-3.10.0-327.36.3.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.36.3.el7.ppc64.rpm kernel-devel-3.10.0-327.36.3.el7.ppc64.rpm kernel-headers-3.10.0-327.36.3.el7.ppc64.rpm kernel-tools-3.10.0-327.36.3.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm kernel-tools-libs-3.10.0-327.36.3.el7.ppc64.rpm perf-3.10.0-327.36.3.el7.ppc64.rpm perf-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm python-perf-3.10.0-327.36.3.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm ppc64le: kernel-3.10.0-327.36.3.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.36.3.el7.ppc64le.rpm kernel-debug-3.10.0-327.36.3.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.36.3.el7.ppc64le.rpm kernel-devel-3.10.0-327.36.3.el7.ppc64le.rpm kernel-headers-3.10.0-327.36.3.el7.ppc64le.rpm kernel-tools-3.10.0-327.36.3.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.36.3.el7.ppc64le.rpm perf-3.10.0-327.36.3.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm python-perf-3.10.0-327.36.3.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm s390x: kernel-3.10.0-327.36.3.el7.s390x.rpm kernel-debug-3.10.0-327.36.3.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-327.36.3.el7.s390x.rpm kernel-debug-devel-3.10.0-327.36.3.el7.s390x.rpm kernel-debuginfo-3.10.0-327.36.3.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-327.36.3.el7.s390x.rpm kernel-devel-3.10.0-327.36.3.el7.s390x.rpm kernel-headers-3.10.0-327.36.3.el7.s390x.rpm kernel-kdump-3.10.0-327.36.3.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-327.36.3.el7.s390x.rpm kernel-kdump-devel-3.10.0-327.36.3.el7.s390x.rpm perf-3.10.0-327.36.3.el7.s390x.rpm perf-debuginfo-3.10.0-327.36.3.el7.s390x.rpm python-perf-3.10.0-327.36.3.el7.s390x.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.s390x.rpm x86_64: kernel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-headers-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.3.el7.x86_64.rpm perf-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.36.3.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-327.36.3.el7.ppc64.rpm perf-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm kernel-debug-devel-3.10.0-327.36.3.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.36.3.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-327.36.3.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-327.36.3.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.3.el7.noarch.rpm kernel-doc-3.10.0-327.36.3.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-devel-3.10.0-327.36.3.el7.x86_64.rpm kernel-headers-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.3.el7.x86_64.rpm perf-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.3.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5195 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/2706661 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYDg9CXlSAg2UNWIIRAjCIAKCfqFMrcCxhrfT5Rb8jZoRBqdTUagCgkFXS If4V2m2AWYozb9GesaZsr5Y= =1J1k -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.98

sources: NVD: CVE-2016-5195 // BID: 93793 // VULMON: CVE-2016-5195 // PACKETSTORM: 139242 // PACKETSTORM: 139448 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139250 // PACKETSTORM: 141579 // PACKETSTORM: 139404 // PACKETSTORM: 139314

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.6

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 1.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.10.104

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.6

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.1.35

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.2

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.4

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:24

Trust: 1.0

vendor:netappmodel:oncommand performance managerscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.18.44

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:redhatmodel:enterprise linux tusscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.7

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.10

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.13

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:23

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.4.113

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.12.66

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:netappmodel:oncommand unified manager for clustered data ontapscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.5

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:netappmodel:hci storage nodesscope:eqversion: -

Trust: 1.0

vendor:netappmodel:oncommand balancescope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.2.83

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.38

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.26

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.6

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.3

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.9

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.11

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:25

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.19

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.22

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.8

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.7.9

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.2

Trust: 1.0

vendor:netappmodel:snapprotectscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.5

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.0.14

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.1.8

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:5.1

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.8.3

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:7.1.0

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:0

Trust: 0.6

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.62

Trust: 0.3

vendor:hpmodel:msr95xscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.110.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.114

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.117

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:32.0.1700.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.22

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.112

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:8800

Trust: 0.3

vendor:hpmodel:(comware r2122scope:eqversion:79007)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.46

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.4

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.89

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.80

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.155

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.4

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.16

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.131

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.36

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59507)0

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.25

Trust: 0.3

vendor:ciscomodel:ip interoperability and collaboration systemscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.80

Trust: 0.3

vendor:hpmodel:5130ei (comwarescope:eqversion:7)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.10

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3400

Trust: 0.3

vendor:redhatmodel:enterprise linux client optionalscope:eqversion:7

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.4

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:12800

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:7

Trust: 0.3

vendor:hpmodel:12900escope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.27

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.170

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.0.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.2

Trust: 0.3

vendor:hpmodel:6127xlgscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber guestscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.65

Trust: 0.3

vendor:ciscomodel:vds recorderscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.4

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:12800

Trust: 0.3

vendor:ciscomodel:visual quality experience serverscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:junos space 15.1f2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.32

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.1.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.2

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.0

Trust: 0.3

vendor:virtuozzomodel:containers for linuxscope:eqversion:4.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.3

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:16.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.42

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c15scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.31

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.1

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.121

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.88

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:8800

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59307)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63-2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.9

Trust: 0.3

vendor:susemodel:linux enterprise server sp2 ltssscope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:hpmodel:msr3000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr2000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.10

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.34

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.49

Trust: 0.3

vendor:redhatmodel:enterprise linux clientscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:junipermodel:junos space 15.1r2.11scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.342

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.6

Trust: 0.3

vendor:ciscomodel:scosscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.57

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.48

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1192.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.37

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc4scope: - version: -

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.16

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.49

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.13

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.2h968406scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.66

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.49

Trust: 0.3

vendor:ciscomodel:common services platform collectorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vds-tv streamerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.31

Trust: 0.3

vendor:hpmodel:5510hiscope:eqversion:0

Trust: 0.3

vendor:hpmodel:6125xlgscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.124

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.169

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.47

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.14

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:6.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.405

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.54

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.2

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20spc700scope:neversion: -

Trust: 0.3

vendor:susemodel:linux enterprise server 11-extrascope: - version: -

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rcscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise module for public cloudscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.21

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.87

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.46

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.99

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.168

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.53

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.9

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:75007)0

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.3

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.41

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.0.997

Trust: 0.3

vendor:ciscomodel:prime network change and configuration managementscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.71

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.128.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.67

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.65

Trust: 0.3

vendor:ciscomodel:ucs directorscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.12

Trust: 0.3

vendor:junipermodel:junos space 15.2r1scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:105007)0

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.23

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.110

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.5

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.108

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.8

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.19

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:129007)0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.1

Trust: 0.3

vendor:linuxmodel:kernel 3.13-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.116

Trust: 0.3

vendor:hpmodel:msr1000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.17

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.67

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.115

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.2

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite service managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.8

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.14

Trust: 0.3

vendor:ciscomodel:dx series ip phonesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.56

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.33

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.76

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc8scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.2

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:79007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:35.0.1916.155

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.38

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.2

Trust: 0.3

vendor:vmwaremodel:vrealize operations 6.2.0ascope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.24

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.57

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.7.9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.88

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.82

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.15

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.70

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.404

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.344

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.55

Trust: 0.3

vendor:ciscomodel:spa122 analog telephone adapter with routerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.8-rc1scope: - version: -

Trust: 0.3

vendor:virtuozzomodel:virtuozzoscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:7800

Trust: 0.3

vendor:susemodel:linux enterprise point of sale 11-sp3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:susemodel:linux enterprise server 12-ltssscope: - version: -

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.401

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.14

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp1scope:eqversion:12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:37.0.2062.119

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.54

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.123

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.50

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.3.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.2

Trust: 0.3

vendor:googlemodel:android onescope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.4

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1165239scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.59

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.3

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:44000

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.113

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.60

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.35

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorsscope:eqversion:1900

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.40

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:susemodel:linux enterprise server for sapscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.14

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:8800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.18

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.41

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.12

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux mrgscope:eqversion:2

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.75

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.24

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:5.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.66

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.131)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.38

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:13.3

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.4

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.62

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1122.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.64

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63

Trust: 0.3

vendor:hpmodel:moonshotscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.116

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.37

Trust: 0.3

vendor:junipermodel:junos space 15.2r2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.1

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.93

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:onepk all-in-one virtual machinescope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp4scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.61

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.71

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.1

Trust: 0.3

vendor:susemodel:linux enterprise workstation extension sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.57

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60spc100scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.21

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6.1.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:ciscomodel:vds-tv vaultscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.31

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.8

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:hpmodel:hsr6600 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1183.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.18

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect analog telephone adapterscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:googlemodel:chrome osscope:neversion:54.0.2840.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.171

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.57

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.13

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.1

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.73

Trust: 0.3

vendor:ciscomodel:dcm series d990x digital content managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.156

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.10

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.3

Trust: 0.3

vendor:opensusemodel:leapscope:eqversion:42.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.3

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.64

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:57007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.58

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.56

Trust: 0.3

vendor:junipermodel:junos space 14.1r1.9scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.154

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.25

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.6

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.172

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:6800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:6800

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.1.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:33.0.1750.152

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.18

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.7

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.61

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.403

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc5scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.10

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.0

Trust: 0.3

vendor:hpmodel:vsr (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.152

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.55

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.65

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c13scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 3.0-rc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.1

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59207)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.7

Trust: 0.3

vendor:ciscomodel:smart net total care onpremscope:eqversion:-0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.54

Trust: 0.3

vendor:virtuozzomodel:update hotfixscope:neversion:6.011

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:6800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.11

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:2.1.1.3-6513

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos space 16.1r1scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.161

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.0.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.8

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.42

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c12scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.23

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.43

Trust: 0.3

vendor:hpmodel:hsr6800 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:23.0.1271.94

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:3.1.0.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.0

Trust: 0.3

vendor:susemodel:manager proxyscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.91

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.46

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.4

Trust: 0.3

vendor:linuxmodel:kernel 3.7-rc1scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:7800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.10.140.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.58

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.01

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.134.14

Trust: 0.3

vendor:ciscomodel:ata analog telephone adaptorscope:eqversion:1870

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.76

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.21

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.1

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.15

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:8.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.79

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.74

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.131.0

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.7

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.63

Trust: 0.3

vendor:huaweimodel:ar3200 v200r007c00scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.6

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:12800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:vds-tv caching nodesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.19

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.55

Trust: 0.3

vendor:susemodel:openstack cloudscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.72

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.12

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:4.0.1

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c10scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:43000

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.82

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.55

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.52

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.8.3

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1185.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1.8

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.6)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.0

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernel 4.3-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.126.0

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc3scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.01

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.1

Trust: 0.3

vendor:virtuozzomodel:server bare metalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.159

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.68

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.20

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.24

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.30

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.93

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.38

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.50

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:nexus series fabric switches aci modescope:eqversion:9000-0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.84

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.86

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:7800

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.173

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.1

Trust: 0.3

vendor:susemodel:managerscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.45

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.44

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:3.1.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:hpmodel:5130hiscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp3scope:eqversion:11

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.10

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:neversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.2

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.126

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.21

Trust: 0.3

vendor:ciscomodel:cloud object storagescope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.4

Trust: 0.3

vendor:junipermodel:junos space 14.1r1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.6

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.2

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.7

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.18

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.118

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.75

Trust: 0.3

vendor:susemodel:linux enterprise live patchingscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.44

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.87

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.35

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.81

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:6.1.17

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.92

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.10

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:19507)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:125007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.36

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.86

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.47

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.85

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c16scope: - version: -

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.0

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc4scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:40.0.2214.114

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:3.0.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.51

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.343

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.4.26

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.5mr2scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:52.0.2743.85

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.125

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.11

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.2.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.400

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:linuxmodel:kernel 3.17-rc3scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59407)0

Trust: 0.3

vendor:ciscomodel:prime service catalog virtual appliancescope:eqversion:0

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.22

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.92

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.14

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.52

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.18

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1180.0

Trust: 0.3

vendor:ciscomodel:prime data center network managerscope:eqversion: -

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364160

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.28

Trust: 0.3

vendor:ciscomodel:mxe series media experience enginesscope:eqversion:35000

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite video recordingscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.144

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.69

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:neversion:7.6.406-3402.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23

Trust: 0.3

vendor:ciscomodel:webex meetings server mr1scope:eqversion:2.5

Trust: 0.3

vendor:hpmodel:msr4000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.99.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.122

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.35

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.47

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.6

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.77

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.98

Trust: 0.3

vendor:ciscomodel:visual quality experience tools serverscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.00

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.119

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:11.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.17

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1157986scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.5

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.4

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp2scope:eqversion:11

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.98

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.402

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.36

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.10

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:7800

Trust: 0.3

vendor:hpmodel:(comware r3108p03scope:eqversion:51307)

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:7800

Trust: 0.3

sources: BID: 93793 // CNNVD: CNNVD-201610-665 // NVD: CVE-2016-5195

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5195
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2016-5195
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201610-665
value: HIGH

Trust: 0.6

VULMON: CVE-2016-5195
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5195
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2016-5195
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: VULMON: CVE-2016-5195 // CNNVD: CNNVD-201610-665 // NVD: CVE-2016-5195 // NVD: CVE-2016-5195

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.0

sources: NVD: CVE-2016-5195

THREAT TYPE

local

Trust: 1.6

sources: BID: 93793 // PACKETSTORM: 139242 // PACKETSTORM: 139448 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139250 // PACKETSTORM: 139404 // PACKETSTORM: 139314 // CNNVD: CNNVD-201610-665

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201610-665

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2016-5195

PATCH

title:Linux kernel Remedial measures for local privilege escalationurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64976

Trust: 0.6

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162110 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162124 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162128 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162126 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162106 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162127 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162120 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162132 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162118 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162098 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162105 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162133 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162107 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux-snapdragon vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-4

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-1

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-3

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-2

Trust: 0.1

title:Ubuntu Security Notice: linux-ti-omap4 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-2

Trust: 0.1

title:Cisco: Cisco TelePresence Video Communication Server Test Validation Script Issueurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20181107-vcsd

Trust: 0.1

title:dirty-cow-toolkiturl:https://github.com/roliboy/rootcow

Trust: 0.1

title: - url:https://github.com/yatt-ze/DirtyCowAndroid

Trust: 0.1

title:polaris-dict-a63-archurl:https://github.com/zaoqi/polaris-dict-a63-arch

Trust: 0.1

sources: VULMON: CVE-2016-5195 // CNNVD: CNNVD-201610-665

EXTERNAL IDS

db:NVDid:CVE-2016-5195

Trust: 2.8

db:CERT/CCid:VU#243144

Trust: 1.9

db:JUNIPERid:JSA10770

Trust: 1.9

db:BIDid:93793

Trust: 1.9

db:OPENWALLid:OSS-SECURITY/2022/08/08/8

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2016/10/30/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2022/03/07/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2016/10/21/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2022/08/08/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2022/08/15/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2022/08/08/2

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2022/08/08/7

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2016/10/26/7

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2022/08/09/4

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2016/10/27/13

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2016/11/03/7

Trust: 1.6

db:EXPLOIT-DBid:40611

Trust: 1.6

db:EXPLOIT-DBid:40839

Trust: 1.6

db:EXPLOIT-DBid:40616

Trust: 1.6

db:EXPLOIT-DBid:40847

Trust: 1.6

db:PACKETSTORMid:139277

Trust: 1.6

db:PACKETSTORMid:139922

Trust: 1.6

db:PACKETSTORMid:139286

Trust: 1.6

db:PACKETSTORMid:139923

Trust: 1.6

db:PACKETSTORMid:139287

Trust: 1.6

db:PACKETSTORMid:142151

Trust: 1.6

db:MCAFEEid:SB10176

Trust: 1.6

db:MCAFEEid:SB10222

Trust: 1.6

db:MCAFEEid:SB10177

Trust: 1.6

db:JUNIPERid:JSA10774

Trust: 1.6

db:JUNIPERid:JSA10807

Trust: 1.6

db:SECTRACKid:1037078

Trust: 1.6

db:CNNVDid:CNNVD-201610-665

Trust: 0.6

db:VULMONid:CVE-2016-5195

Trust: 0.1

db:PACKETSTORMid:139242

Trust: 0.1

db:PACKETSTORMid:139448

Trust: 0.1

db:PACKETSTORMid:139342

Trust: 0.1

db:PACKETSTORMid:139335

Trust: 0.1

db:PACKETSTORMid:139250

Trust: 0.1

db:PACKETSTORMid:141579

Trust: 0.1

db:PACKETSTORMid:139404

Trust: 0.1

db:PACKETSTORMid:139314

Trust: 0.1

sources: VULMON: CVE-2016-5195 // BID: 93793 // PACKETSTORM: 139242 // PACKETSTORM: 139448 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139250 // PACKETSTORM: 141579 // PACKETSTORM: 139404 // PACKETSTORM: 139314 // CNNVD: CNNVD-201610-665 // NVD: CVE-2016-5195

REFERENCES

url:http://www.securityfocus.com/bid/93793

Trust: 2.2

url:https://access.redhat.com/security/cve/cve-2016-5195

Trust: 2.1

url:http://rhn.redhat.com/errata/rhsa-2016-2118.html

Trust: 2.0

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.9

url:https://bugzilla.redhat.com/show_bug.cgi?id=1384344

Trust: 1.9

url:https://source.android.com/security/bulletin/2016-12-01.html

Trust: 1.9

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en

Trust: 1.9

url:https://github.com/dirtycow/dirtycow.github.io/wiki/pocs

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2016-2120.html

Trust: 1.9

url:https://www.kb.cert.org/vuls/id/243144

Trust: 1.9

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-linux

Trust: 1.9

url:https://github.com/dirtycow/dirtycow.github.io/wiki/vulnerabilitydetails

Trust: 1.9

url:https://access.redhat.com/security/vulnerabilities/2706661

Trust: 1.9

url:http://www.ubuntu.com/usn/usn-3106-4

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3106-1

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2133.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2106.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3104-1

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2124.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2098.html

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03722en_us

Trust: 1.6

url:https://security.paloaltonetworks.com/cve-2016-5195

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2022/03/07/1

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05347541

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-3106-3

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-3106-2

Trust: 1.6

url:http://www.securityfocus.com/archive/1/539611/100/0/threaded

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2016/10/21/1

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html

Trust: 1.6

url:http://packetstormsecurity.com/files/139922/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.6

url:http://packetstormsecurity.com/files/139277/kernel-live-patch-security-notice-lsn-0012-1.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2016/10/27/13

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2022/08/09/4

Trust: 1.6

url:http://packetstormsecurity.com/files/139923/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2127.html

Trust: 1.6

url:http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2132.html

Trust: 1.6

url:http://www.securitytracker.com/id/1037078

Trust: 1.6

url:http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded

Trust: 1.6

url:https://dirtycow.ninja

Trust: 1.6

url:http://packetstormsecurity.com/files/139286/dirtycow-linux-kernel-race-condition.html

Trust: 1.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-vcsd

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03742en_us

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-3107-2

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-3107-1

Trust: 1.6

url:http://www.securityfocus.com/archive/1/540344/100/0/threaded

Trust: 1.6

url:https://www.exploit-db.com/exploits/40839/

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05352241

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2016/10/26/7

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html

Trust: 1.6

url:http://www.debian.org/security/2016/dsa-3696

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03707en_us

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2128.html

Trust: 1.6

url:https://people.canonical.com/~ubuntu-security/cve/2016/cve-2016-5195.html

Trust: 1.6

url:https://security-tracker.debian.org/tracker/cve-2016-5195

Trust: 1.6

url:https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.6

url:http://www.securityfocus.com/archive/1/540736/100/0/threaded

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20161025-0001/

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2107.html

Trust: 1.6

url:https://www.exploit-db.com/exploits/40611/

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2016/10/30/1

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03761en_us

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-3104-2

Trust: 1.6

url:http://packetstormsecurity.com/files/142151/kernel-live-patch-security-notice-lsn-0021-1.html

Trust: 1.6

url:http://packetstormsecurity.com/files/139287/dirtycow-local-root-proof-of-concept.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html

Trust: 1.6

url:https://access.redhat.com/errata/rhsa-2017:0372

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html

Trust: 1.6

url:https://source.android.com/security/bulletin/2016-11-01.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html

Trust: 1.6

url:http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2016/11/03/7

Trust: 1.6

url:http://www.securityfocus.com/archive/1/540252/100/0/threaded

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html

Trust: 1.6

url:http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html

Trust: 1.6

url:https://bugzilla.suse.com/show_bug.cgi?id=1004418

Trust: 1.6

url:https://bto.bluecoat.com/security-advisory/sa134

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2110.html

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05352241

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2105.html

Trust: 1.6

url:http://fortiguard.com/advisory/fg-ir-16-063

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10176

Trust: 1.6

url:https://www.exploit-db.com/exploits/40847/

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10177

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10807

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05341463

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-3105-2

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html

Trust: 1.6

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2022/08/08/1

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2022/08/08/2

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-3105-1

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2126.html

Trust: 1.6

url:http://www.kernel.org/pub/linux/kernel/v4.x/changelog-4.8.3

Trust: 1.6

url:https://www.exploit-db.com/exploits/40616/

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10222

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html

Trust: 1.6

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2022/08/08/7

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2022/08/08/8

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10770

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2022/08/15/1

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10774

Trust: 1.6

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/w3aprvdvpdbxlh4dc5ukzvcr742mjim3/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nwmdlbwmgzkfhmrj7quqvcerp5qhdb6w/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/e7m62srp6czlj4zxcrzkv4wplqbsr7dt/

Trust: 1.0

url:http://securityadvisories.paloaltonetworks.com/home/detail/73

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2016-5195

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nwmdlbwmgzkfhmrj7quqvcerp5qhdb6w/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/e7m62srp6czlj4zxcrzkv4wplqbsr7dt/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/w3aprvdvpdbxlh4dc5ukzvcr742mjim3/

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-cn

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://github.com/amluto/vulnerabilities/blob/master/others/cve-2016-5195/test_cve-2016-5195.c

Trust: 0.3

url:https://dirtycow.ninja/

Trust: 0.3

url:http://www.kernel.org/

Trust: 0.3

url:https://googlechromereleases.blogspot.in/2016/10/stable-channel-update-for-chrome-os_26.html

Trust: 0.3

url:https://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2147515

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10770&actp=rss

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613795

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613794

Trust: 0.3

url:http://kb.odin.com/en/129683

Trust: 0.3

url:https://github.com/timwr/cve-2016-5195

Trust: 0.3

url:https://forum.proxmox.com/threads/cve-2016-5195-dirty-cow.29908/

Trust: 0.3

url:https://centos.org/forums/viewtopic.php?f=51&p=252514

Trust: 0.3

url:https://www.cloudlinux.com/kernelcare-blog/entry/dirty-cow-vulnerability-the-fix-is-coming

Trust: 0.3

url:https://security-tracker.debian.org/tracker/dla-670-1

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05347541

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05352241

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05341463

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=isg3t1024478

Trust: 0.3

url:https://coreos.com/blog/cve-2016-5195.html

Trust: 0.3

url:https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=9691eac5593ff1e2f82391ad327f21d90322aec1

Trust: 0.3

url:https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/

Trust: 0.3

url:https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995667

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3104-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-3/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-4/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3107-1/

Trust: 0.3

url:https://help.virtuozzo.com/customer/en/portal/articles/2613793

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2016-0018.html

Trust: 0.3

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1032.36

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4470

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.2.0-113.155

Trust: 0.1

url:http://www.vmware.com/security/advisories/vmsa-2016-0018.html>

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03707en_us

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:http://www.vmware.com/security/advisories/vmsa-2016-0016.html>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7457

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1583

Trust: 0.1

sources: BID: 93793 // PACKETSTORM: 139242 // PACKETSTORM: 139448 // PACKETSTORM: 139342 // PACKETSTORM: 139335 // PACKETSTORM: 139250 // PACKETSTORM: 141579 // PACKETSTORM: 139404 // PACKETSTORM: 139314 // CNNVD: CNNVD-201610-665 // NVD: CVE-2016-5195

CREDITS

Phil Oester.

Trust: 0.9

sources: BID: 93793 // CNNVD: CNNVD-201610-665

SOURCES

db:VULMONid:CVE-2016-5195
db:BIDid:93793
db:PACKETSTORMid:139242
db:PACKETSTORMid:139448
db:PACKETSTORMid:139342
db:PACKETSTORMid:139335
db:PACKETSTORMid:139250
db:PACKETSTORMid:141579
db:PACKETSTORMid:139404
db:PACKETSTORMid:139314
db:CNNVDid:CNNVD-201610-665
db:NVDid:CVE-2016-5195

LAST UPDATE DATE

2025-02-13T21:02:33.854000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2016-5195date:2023-11-07T00:00:00
db:BIDid:93793date:2017-12-19T22:37:00
db:CNNVDid:CNNVD-201610-665date:2022-08-16T00:00:00
db:NVDid:CVE-2016-5195date:2025-01-29T18:15:28.220

SOURCES RELEASE DATE

db:VULMONid:CVE-2016-5195date:2016-11-10T00:00:00
db:BIDid:93793date:2016-10-19T00:00:00
db:PACKETSTORMid:139242date:2016-10-20T15:36:20
db:PACKETSTORMid:139448date:2016-11-01T14:18:06
db:PACKETSTORMid:139342date:2016-10-26T23:25:21
db:PACKETSTORMid:139335date:2016-10-26T14:02:58
db:PACKETSTORMid:139250date:2016-10-20T15:37:15
db:PACKETSTORMid:141579date:2017-03-11T11:11:00
db:PACKETSTORMid:139404date:2016-10-28T23:22:00
db:PACKETSTORMid:139314date:2016-10-24T21:34:23
db:CNNVDid:CNNVD-201610-665date:2016-10-21T00:00:00
db:NVDid:CVE-2016-5195date:2016-11-10T21:59:00.197