ID

VAR-201611-0386


CVE

CVE-2016-5195


TITLE

Linux kernel memory subsystem copy on write mechanism contains a race condition vulnerability

Trust: 0.8

sources: CERT/CC: VU#243144

DESCRIPTION

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW.". Linux kernel is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security update Advisory ID: RHSA-2016:2110-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2110.html Issue date: 2016-10-26 CVE Names: CVE-2016-5195 CVE-2016-7039 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important) * Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important) Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375944 - CVE-2016-7039 kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash 1384344 - CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-327.36.3.rt56.238.el7.src.rpm noarch: kernel-rt-doc-3.10.0-327.36.3.rt56.238.el7.noarch.rpm x86_64: kernel-rt-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-kvm-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-327.36.3.rt56.238.el7.src.rpm noarch: kernel-rt-doc-3.10.0-327.36.3.rt56.238.el7.noarch.rpm x86_64: kernel-rt-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5195 https://access.redhat.com/security/cve/CVE-2016-7039 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/2706661 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYEKKsXlSAg2UNWIIRAmI+AJkB5tkOU2r9pjWJ4cYCSD9mtyJFBwCgt+er yvfTfHwrbVXZfa/y1n2XeMs= =LaOt -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Stop ovc processes: ovc stop 3. Stop vertica db: su pv_vertica -c "/opt/vertica/bin/adminTools -t stop_db - -d pv -i -F" 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03722en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbgn03722en_us Version: 1 HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-03-30 Last Updated: 2017-03-30 Potential Security Impact: Local: Escalation of Privilege Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A security vulnerability in Linux kernel, also known as "Dirty COW", has been addressed in HPE Operations Agent. This vulnerability could be exploited locally to allow escalation of privilege. References: - CVE-2016-5195 - Linux kernel vulnerability, Dirty "COW" SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HPE Operations agent software - v11.11, v11.12, v11.13, v11.14 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2016-5195 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has made the following mitigation steps available to resolve the vulnerability in the impacted versions of HPE Operations Agent. Login to the Operations Agent system with root privileges 2. Update the system using 'yum update kernel' command 3. Reboot the server using '/sbin/shutdown -r now' command Please contact HPE Technical Support if any assistance is needed regarding the mitigation steps. HISTORY Version:1 (rev.1) - 30 March 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ========================================================================== Ubuntu Security Notice USN-3105-2 October 20, 2016 linux-lts-trusty vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: The system could be made to run programs as an administrator. Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise Details: USN-3105-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 LTS. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: linux-image-3.13.0-100-generic 3.13.0-100.147~precise1 linux-image-3.13.0-100-generic-lpae 3.13.0-100.147~precise1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2024-041 Product: DiCal-RED Manufacturer: Swissphone Wireless AG Affected Version(s): Unknown Tested Version(s): 4009 Vulnerability Type: Use of Unmaintained Third Party Components (CWE-1104) Risk Level: High Solution Status: Open Manufacturer Notification: 2024-04-16 Solution Date: None Public Disclosure: 2024-08-20 CVE Reference: CVE-2016-5195, CVE-2016-7406, CVE-2019-12815 and others Author of Advisory: Sebastian Hamann, SySS GmbH ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: DiCal-RED is a radio module for communication between emergency vehicles and control rooms. It provides Ethernet, Wi-Fi and cellular network connectivity and runs a Linux- and BusyBox-based operating system. The manufacturer describes the product as follows (see [1]): "The DiCal-Red radio data module reliably guides you to your destination. This is ensured by the linking of navigation (also for the transmission of position data) and various radio modules." Due to the use of unmaintained third-party software components, the device is vulnerable to numerous known security issues. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Vulnerability Details: The device's operating system is based on several well-known open-source products, such as the Linux kernel, the Dropbear SSH server and the ProFTPD FTP server. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): None ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: The manufacturer recommends not running the device in an untrusted network. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2024-02-29: Vulnerability discovered 2024-04-16: Vulnerability reported to manufacturer 2024-05-10: Manufacturer states that the vulnerability will not be fixed 2024-05-14: Vulnerability reported to CERT-Bund 2024-08-13: CERT-Bund informs us that the vendor declared the product EOL 2024-08-20: Public disclosure of vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] Product website for DiCal-RED https://www.swissphone.com/solutions/components/terminals/radio-data-module-dical-red/ [2] SySS Security Advisory SYSS-2024-041 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-041.txt [3] SySS Responsible Disclosure Policy https://www.syss.de/en/responsible-disclosure-policy ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Sebastian Hamann of SySS GmbH. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS website

Trust: 2.61

sources: NVD: CVE-2016-5195 // CERT/CC: VU#243144 // BID: 93793 // VULMON: CVE-2016-5195 // PACKETSTORM: 139337 // PACKETSTORM: 142975 // PACKETSTORM: 141870 // PACKETSTORM: 141579 // PACKETSTORM: 139251 // PACKETSTORM: 139252 // PACKETSTORM: 180356

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 1.3

vendor:linuxmodel:kernelscope:ltversion:3.12.66

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.9

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:netappmodel:hci storage nodesscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.3

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.5

Trust: 1.0

vendor:redhatmodel:enterprise linux tusscope:eqversion:6.5

Trust: 1.0

vendor:netappmodel:oncommand balancescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.2

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.2.83

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.8

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.6

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.10.104

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.18.44

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.22

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.7.9

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.7

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.26

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.1.35

Trust: 1.0

vendor:netappmodel:oncommand unified manager for clustered data ontapscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.10

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.8.3

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.6

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:7.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.38

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.4

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:24

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.11

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:5.1

Trust: 1.0

vendor:netappmodel:oncommand performance managerscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.2

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.5

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.0.14

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.13

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:netappmodel:snapprotectscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.4.113

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:25

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.1.8

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:23

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.19

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.1

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:coreosmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:paging serverscope:eqversion:0

Trust: 0.6

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.62

Trust: 0.3

vendor:hpmodel:msr95xscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.110.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.114

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.117

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:32.0.1700.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.22

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.112

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:8800

Trust: 0.3

vendor:hpmodel:(comware r2122scope:eqversion:79007)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.46

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.4

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.89

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.80

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.155

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.4

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.16

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.131

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.36

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59507)0

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.25

Trust: 0.3

vendor:ciscomodel:ip interoperability and collaboration systemscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.80

Trust: 0.3

vendor:hpmodel:5130ei (comwarescope:eqversion:7)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.10

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3400

Trust: 0.3

vendor:redhatmodel:enterprise linux client optionalscope:eqversion:7

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.4

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:12800

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:7

Trust: 0.3

vendor:hpmodel:12900escope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.27

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.170

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.0.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.2

Trust: 0.3

vendor:hpmodel:6127xlgscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber guestscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.65

Trust: 0.3

vendor:ciscomodel:vds recorderscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.4

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:12800

Trust: 0.3

vendor:ciscomodel:visual quality experience serverscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:junos space 15.1f2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.32

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.1.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.2

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.0

Trust: 0.3

vendor:virtuozzomodel:containers for linuxscope:eqversion:4.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.3

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:16.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.42

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c15scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.31

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.1

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.121

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.88

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:8800

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59307)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63-2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.9

Trust: 0.3

vendor:susemodel:linux enterprise server sp2 ltssscope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:hpmodel:msr3000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr2000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.10

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.34

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.49

Trust: 0.3

vendor:redhatmodel:enterprise linux clientscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:junipermodel:junos space 15.1r2.11scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.342

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.6

Trust: 0.3

vendor:ciscomodel:scosscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.57

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.48

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1192.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.37

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc4scope: - version: -

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.16

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.49

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.13

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.2h968406scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.66

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.49

Trust: 0.3

vendor:ciscomodel:common services platform collectorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vds-tv streamerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.31

Trust: 0.3

vendor:hpmodel:5510hiscope:eqversion:0

Trust: 0.3

vendor:hpmodel:6125xlgscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.124

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.169

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.47

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.14

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:6.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.405

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.54

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.2

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20spc700scope:neversion: -

Trust: 0.3

vendor:susemodel:linux enterprise server 11-extrascope: - version: -

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rcscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise module for public cloudscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.21

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.87

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.46

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.99

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.168

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.53

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.9

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:75007)0

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.3

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.41

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.0.997

Trust: 0.3

vendor:ciscomodel:prime network change and configuration managementscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.71

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.128.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.67

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.65

Trust: 0.3

vendor:ciscomodel:ucs directorscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.12

Trust: 0.3

vendor:junipermodel:junos space 15.2r1scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:105007)0

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.23

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.110

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.5

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.108

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.8

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.19

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:129007)0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.1

Trust: 0.3

vendor:linuxmodel:kernel 3.13-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.116

Trust: 0.3

vendor:hpmodel:msr1000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.17

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.67

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.115

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.2

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite service managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.8

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.14

Trust: 0.3

vendor:ciscomodel:dx series ip phonesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.56

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.33

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.76

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc8scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.2

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:79007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:35.0.1916.155

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.38

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.2

Trust: 0.3

vendor:vmwaremodel:vrealize operations 6.2.0ascope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.24

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.57

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.7.9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.88

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.82

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.15

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.70

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.404

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.344

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.55

Trust: 0.3

vendor:ciscomodel:spa122 analog telephone adapter with routerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.8-rc1scope: - version: -

Trust: 0.3

vendor:virtuozzomodel:virtuozzoscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:7800

Trust: 0.3

vendor:susemodel:linux enterprise point of sale 11-sp3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:susemodel:linux enterprise server 12-ltssscope: - version: -

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.401

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.14

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp1scope:eqversion:12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:37.0.2062.119

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.54

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.123

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.50

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.3.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.2

Trust: 0.3

vendor:googlemodel:android onescope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.4

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1165239scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.59

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.3

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:44000

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.113

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.60

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.35

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorsscope:eqversion:1900

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.40

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:susemodel:linux enterprise server for sapscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.14

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:8800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.18

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.41

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.12

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux mrgscope:eqversion:2

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.75

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.24

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:5.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.66

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.131)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.38

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:13.3

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.4

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.62

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1122.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.64

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63

Trust: 0.3

vendor:hpmodel:moonshotscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.116

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.37

Trust: 0.3

vendor:junipermodel:junos space 15.2r2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.1

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.93

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:onepk all-in-one virtual machinescope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp4scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.61

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.71

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.1

Trust: 0.3

vendor:susemodel:linux enterprise workstation extension sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.57

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60spc100scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.21

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6.1.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:ciscomodel:vds-tv vaultscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.31

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.8

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:hpmodel:hsr6600 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1183.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.18

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect analog telephone adapterscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:googlemodel:chrome osscope:neversion:54.0.2840.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.171

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.57

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.13

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.1

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.73

Trust: 0.3

vendor:ciscomodel:dcm series d990x digital content managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.156

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.10

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.3

Trust: 0.3

vendor:opensusemodel:leapscope:eqversion:42.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.3

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.64

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:57007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.58

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.56

Trust: 0.3

vendor:junipermodel:junos space 14.1r1.9scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.154

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.25

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.6

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.172

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:6800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:6800

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.1.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:33.0.1750.152

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.18

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.7

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.61

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.403

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc5scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.10

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.0

Trust: 0.3

vendor:hpmodel:vsr (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.152

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.55

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.65

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c13scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 3.0-rc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.1

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59207)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.7

Trust: 0.3

vendor:ciscomodel:smart net total care onpremscope:eqversion:-0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.54

Trust: 0.3

vendor:virtuozzomodel:update hotfixscope:neversion:6.011

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:6800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.11

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:2.1.1.3-6513

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos space 16.1r1scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.161

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.0.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.8

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.42

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c12scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.23

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.43

Trust: 0.3

vendor:hpmodel:hsr6800 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:23.0.1271.94

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:3.1.0.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.0

Trust: 0.3

vendor:susemodel:manager proxyscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.91

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.46

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.4

Trust: 0.3

vendor:linuxmodel:kernel 3.7-rc1scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:7800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.10.140.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.58

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.01

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.134.14

Trust: 0.3

vendor:ciscomodel:ata analog telephone adaptorscope:eqversion:1870

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.76

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.21

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.1

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.15

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:8.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.79

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.74

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.131.0

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.7

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.63

Trust: 0.3

vendor:huaweimodel:ar3200 v200r007c00scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.6

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:12800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:vds-tv caching nodesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.19

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.55

Trust: 0.3

vendor:susemodel:openstack cloudscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.72

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.12

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:4.0.1

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c10scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:43000

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.82

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.55

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.52

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.8.3

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1185.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1.8

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.6)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.0

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernel 4.3-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.126.0

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc3scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.01

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.1

Trust: 0.3

vendor:virtuozzomodel:server bare metalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.159

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.68

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.20

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.24

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.30

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.93

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.38

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.50

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:nexus series fabric switches aci modescope:eqversion:9000-0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.84

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.86

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:7800

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.173

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.1

Trust: 0.3

vendor:susemodel:managerscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.45

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.44

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:3.1.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:hpmodel:5130hiscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp3scope:eqversion:11

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.10

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:neversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.2

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.126

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.21

Trust: 0.3

vendor:ciscomodel:cloud object storagescope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.4

Trust: 0.3

vendor:junipermodel:junos space 14.1r1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.6

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.2

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.7

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.18

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.118

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.75

Trust: 0.3

vendor:susemodel:linux enterprise live patchingscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.44

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.87

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.35

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.81

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:6.1.17

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.92

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.10

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:19507)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:125007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.36

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.86

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.47

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.85

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c16scope: - version: -

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.0

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc4scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:40.0.2214.114

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:3.0.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.51

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.343

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.4.26

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.5mr2scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:52.0.2743.85

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.125

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.11

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.2.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.400

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:linuxmodel:kernel 3.17-rc3scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59407)0

Trust: 0.3

vendor:ciscomodel:prime service catalog virtual appliancescope:eqversion:0

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.22

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.92

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.14

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.52

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.18

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1180.0

Trust: 0.3

vendor:ciscomodel:prime data center network managerscope:eqversion: -

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364160

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.28

Trust: 0.3

vendor:ciscomodel:mxe series media experience enginesscope:eqversion:35000

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite video recordingscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.144

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.69

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:neversion:7.6.406-3402.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23

Trust: 0.3

vendor:ciscomodel:webex meetings server mr1scope:eqversion:2.5

Trust: 0.3

vendor:hpmodel:msr4000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.99.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.122

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.35

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.47

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.6

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.77

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.98

Trust: 0.3

vendor:ciscomodel:visual quality experience tools serverscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.00

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.119

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:11.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.17

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1157986scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.5

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.4

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp2scope:eqversion:11

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.98

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.402

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.36

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.10

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:7800

Trust: 0.3

vendor:hpmodel:(comware r3108p03scope:eqversion:51307)

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:7800

Trust: 0.3

sources: CERT/CC: VU#243144 // BID: 93793 // NVD: CVE-2016-5195

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5195
value: HIGH

Trust: 1.0

NVD: CVE-2016-5195
value: MEDIUM

Trust: 0.8

VULMON: CVE-2016-5195
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5195
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2016-5195
severity: MEDIUM
baseScore: 6.8
vectorString: NONE
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2016-5195
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#243144 // VULMON: CVE-2016-5195 // NVD: CVE-2016-5195

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.0

sources: NVD: CVE-2016-5195

THREAT TYPE

local

Trust: 0.6

sources: BID: 93793 // PACKETSTORM: 139337 // PACKETSTORM: 139251 // PACKETSTORM: 139252

TYPE

Design Error

Trust: 0.3

sources: BID: 93793

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#243144 // VULMON: CVE-2016-5195

PATCH

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162110 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162124 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162128 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162126 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162106 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162127 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162120 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162132 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162118 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162098 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162105 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162133 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162107 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux-snapdragon vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-4

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-1

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-3

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-2

Trust: 0.1

title:Ubuntu Security Notice: linux-ti-omap4 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-2

Trust: 0.1

title:Cisco: Cisco TelePresence Video Communication Server Test Validation Script Issueurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20181107-vcsd

Trust: 0.1

title:dirty-cow-toolkiturl:https://github.com/roliboy/rootcow

Trust: 0.1

title: - url:https://github.com/yatt-ze/DirtyCowAndroid

Trust: 0.1

title:polaris-dict-a63-archurl:https://github.com/zaoqi/polaris-dict-a63-arch

Trust: 0.1

sources: VULMON: CVE-2016-5195

EXTERNAL IDS

db:NVDid:CVE-2016-5195

Trust: 2.9

db:CERT/CCid:VU#243144

Trust: 2.1

db:JUNIPERid:JSA10770

Trust: 1.3

db:BIDid:93793

Trust: 1.3

db:PACKETSTORMid:139287

Trust: 1.0

db:PACKETSTORMid:139923

Trust: 1.0

db:PACKETSTORMid:139922

Trust: 1.0

db:PACKETSTORMid:139277

Trust: 1.0

db:PACKETSTORMid:139286

Trust: 1.0

db:PACKETSTORMid:142151

Trust: 1.0

db:EXPLOIT-DBid:40839

Trust: 1.0

db:EXPLOIT-DBid:40616

Trust: 1.0

db:EXPLOIT-DBid:40847

Trust: 1.0

db:EXPLOIT-DBid:40611

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/30/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/11/03/7

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/2

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/27/13

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/15/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/8

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/09/4

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/7

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/21/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/03/07/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/26/7

Trust: 1.0

db:SECTRACKid:1037078

Trust: 1.0

db:MCAFEEid:SB10222

Trust: 1.0

db:MCAFEEid:SB10177

Trust: 1.0

db:MCAFEEid:SB10176

Trust: 1.0

db:JUNIPERid:JSA10774

Trust: 1.0

db:JUNIPERid:JSA10807

Trust: 1.0

db:VULMONid:CVE-2016-5195

Trust: 0.1

db:PACKETSTORMid:139337

Trust: 0.1

db:PACKETSTORMid:142975

Trust: 0.1

db:PACKETSTORMid:141870

Trust: 0.1

db:PACKETSTORMid:141579

Trust: 0.1

db:PACKETSTORMid:139251

Trust: 0.1

db:PACKETSTORMid:139252

Trust: 0.1

db:PACKETSTORMid:180356

Trust: 0.1

sources: CERT/CC: VU#243144 // VULMON: CVE-2016-5195 // BID: 93793 // PACKETSTORM: 139337 // PACKETSTORM: 142975 // PACKETSTORM: 141870 // PACKETSTORM: 141579 // PACKETSTORM: 139251 // PACKETSTORM: 139252 // PACKETSTORM: 180356 // NVD: CVE-2016-5195

REFERENCES

url:https://access.redhat.com/security/cve/cve-2016-5195

Trust: 2.7

url:https://security-tracker.debian.org/tracker/cve-2016-5195

Trust: 2.6

url:https://people.canonical.com/~ubuntu-security/cve/2016/cve-2016-5195.html

Trust: 1.8

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1384344

Trust: 1.3

url:https://source.android.com/security/bulletin/2016-12-01.html

Trust: 1.3

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en

Trust: 1.3

url:https://github.com/dirtycow/dirtycow.github.io/wiki/pocs

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2016-2118.html

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2016-2120.html

Trust: 1.3

url:https://www.kb.cert.org/vuls/id/243144

Trust: 1.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-linux

Trust: 1.3

url:https://github.com/dirtycow/dirtycow.github.io/wiki/vulnerabilitydetails

Trust: 1.3

url:https://dirtycow.ninja/

Trust: 1.1

url:https://coreos.com/blog/cve-2016-5195.html

Trust: 1.1

url:https://access.redhat.com/security/vulnerabilities/2706661

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2110.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3107-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3105-2

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3105-1

Trust: 1.1

url:http://fortiguard.com/advisory/fg-ir-16-063

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10770

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10774

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10807

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139277/kernel-live-patch-security-notice-lsn-0012-1.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139286/dirtycow-linux-kernel-race-condition.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139287/dirtycow-local-root-proof-of-concept.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139922/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139923/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.0

url:http://packetstormsecurity.com/files/142151/kernel-live-patch-security-notice-lsn-0021-1.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2098.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2105.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2106.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2107.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2124.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2126.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2127.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2128.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2132.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2133.html

Trust: 1.0

url:http://www.debian.org/security/2016/dsa-3696

Trust: 1.0

url:http://www.kernel.org/pub/linux/kernel/v4.x/changelog-4.8.3

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/21/1

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/26/7

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/27/13

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/30/1

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/11/03/7

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/03/07/1

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/1

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/2

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/7

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/8

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/09/4

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/15/1

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/539611/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540252/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540344/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540736/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/bid/93793

Trust: 1.0

url:http://www.securitytracker.com/id/1037078

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3104-1

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3104-2

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-1

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-2

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-3

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-4

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3107-2

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2017:0372

Trust: 1.0

url:https://bto.bluecoat.com/security-advisory/sa134

Trust: 1.0

url:https://bugzilla.suse.com/show_bug.cgi?id=1004418

Trust: 1.0

url:https://dirtycow.ninja

Trust: 1.0

url:https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05352241

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03707en_us

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03722en_us

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03742en_us

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03761en_us

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05341463

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05347541

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05352241

Trust: 1.0

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10176

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10177

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10222

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/e7m62srp6czlj4zxcrzkv4wplqbsr7dt/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nwmdlbwmgzkfhmrj7quqvcerp5qhdb6w/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/w3aprvdvpdbxlh4dc5ukzvcr742mjim3/

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20161025-0001/

Trust: 1.0

url:https://security.paloaltonetworks.com/cve-2016-5195

Trust: 1.0

url:https://source.android.com/security/bulletin/2016-11-01.html

Trust: 1.0

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-vcsd

Trust: 1.0

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026

Trust: 1.0

url:https://www.exploit-db.com/exploits/40611/

Trust: 1.0

url:https://www.exploit-db.com/exploits/40616/

Trust: 1.0

url:https://www.exploit-db.com/exploits/40839/

Trust: 1.0

url:https://www.exploit-db.com/exploits/40847/

Trust: 1.0

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.8.3

Trust: 0.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.7.9

Trust: 0.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.4.26

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/362.html

Trust: 0.8

url:https://www.centos.org/forums/viewtopic.php?f=51&t=59782&hilit=cve%202016%205195&start=10

Trust: 0.8

url:https://www.suse.com/security/cve/cve-2016-5195.html

Trust: 0.8

url:https://people.canonical.com/

Trust: 0.8

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1753-field-notice-0026

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-5195

Trust: 0.7

url:https://github.com/amluto/vulnerabilities/blob/master/others/cve-2016-5195/test_cve-2016-5195.c

Trust: 0.3

url:http://www.kernel.org/

Trust: 0.3

url:https://googlechromereleases.blogspot.in/2016/10/stable-channel-update-for-chrome-os_26.html

Trust: 0.3

url:https://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2147515

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10770&actp=rss

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613795

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613794

Trust: 0.3

url:http://kb.odin.com/en/129683

Trust: 0.3

url:https://github.com/timwr/cve-2016-5195

Trust: 0.3

url:https://forum.proxmox.com/threads/cve-2016-5195-dirty-cow.29908/

Trust: 0.3

url:https://centos.org/forums/viewtopic.php?f=51&p=252514

Trust: 0.3

url:https://www.cloudlinux.com/kernelcare-blog/entry/dirty-cow-vulnerability-the-fix-is-coming

Trust: 0.3

url:https://security-tracker.debian.org/tracker/dla-670-1

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05347541

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05352241

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05341463

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=isg3t1024478

Trust: 0.3

url:https://securityadvisories.paloaltonetworks.com/home/detail/73

Trust: 0.3

url:https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=9691eac5593ff1e2f82391ad327f21d90322aec1

Trust: 0.3

url:https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/

Trust: 0.3

url:https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995667

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3104-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-3/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-4/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3107-1/

Trust: 0.3

url:https://help.virtuozzo.com/customer/en/portal/articles/2613793

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2016-0018.html

Trust: 0.3

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.3

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.3

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7039

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7039

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03761en_us

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03722en_us

Trust: 0.1

url:http://www.vmware.com/security/advisories/vmsa-2016-0018.html>

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03707en_us

Trust: 0.1

url:http://www.vmware.com/security/advisories/vmsa-2016-0016.html>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7457

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.8.0-26.28

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-100.147~precise1

Trust: 0.1

url:https://www.swissphone.com/solutions/components/terminals/radio-data-module-dical-red/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7406

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2024-041.txt

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/pgpkeys/sebastian_hamann.asc

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1281

Trust: 0.1

url:https://www.syss.de/en/responsible-disclosure-policy

Trust: 0.1

url:http://creativecommons.org/licenses/by/3.0/deed.en

Trust: 0.1

sources: CERT/CC: VU#243144 // BID: 93793 // PACKETSTORM: 139337 // PACKETSTORM: 142975 // PACKETSTORM: 141870 // PACKETSTORM: 141579 // PACKETSTORM: 139251 // PACKETSTORM: 139252 // PACKETSTORM: 180356 // NVD: CVE-2016-5195

CREDITS

Phil Oester.

Trust: 0.3

sources: BID: 93793

SOURCES

db:CERT/CCid:VU#243144
db:VULMONid:CVE-2016-5195
db:BIDid:93793
db:PACKETSTORMid:139337
db:PACKETSTORMid:142975
db:PACKETSTORMid:141870
db:PACKETSTORMid:141579
db:PACKETSTORMid:139251
db:PACKETSTORMid:139252
db:PACKETSTORMid:180356
db:NVDid:CVE-2016-5195

LAST UPDATE DATE

2024-11-20T21:38:45.411000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#243144date:2016-11-17T00:00:00
db:VULMONid:CVE-2016-5195date:2023-11-07T00:00:00
db:BIDid:93793date:2017-12-19T22:37:00
db:NVDid:CVE-2016-5195date:2024-07-24T14:27:14.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#243144date:2016-10-21T00:00:00
db:VULMONid:CVE-2016-5195date:2016-11-10T00:00:00
db:BIDid:93793date:2016-10-19T00:00:00
db:PACKETSTORMid:139337date:2016-10-26T14:03:09
db:PACKETSTORMid:142975date:2017-06-16T14:19:52
db:PACKETSTORMid:141870date:2017-03-31T16:11:41
db:PACKETSTORMid:141579date:2017-03-11T11:11:00
db:PACKETSTORMid:139251date:2016-10-20T15:37:21
db:PACKETSTORMid:139252date:2016-10-20T15:37:27
db:PACKETSTORMid:180356date:2024-08-23T15:36:16
db:NVDid:CVE-2016-5195date:2016-11-10T21:59:00.197