ID CVE-2018-5407
Summary Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
References
Vulnerable Configurations
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.10
    cpe:2.3:o:canonical:ubuntu_linux:18.10
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
  • Nodejs Node.js 0.0.1
    cpe:2.3:a:nodejs:node.js:0.0.1
  • Nodejs Node.js 0.0.2
    cpe:2.3:a:nodejs:node.js:0.0.2
  • Nodejs Node.js 0.0.3
    cpe:2.3:a:nodejs:node.js:0.0.3
  • Nodejs Node.js 0.0.4
    cpe:2.3:a:nodejs:node.js:0.0.4
  • Nodejs Node.js 0.0.5
    cpe:2.3:a:nodejs:node.js:0.0.5
  • Nodejs Node.js 0.0.6
    cpe:2.3:a:nodejs:node.js:0.0.6
  • Nodejs Node.js 0.1.0
    cpe:2.3:a:nodejs:node.js:0.1.0
  • Nodejs Node.js 0.1.1
    cpe:2.3:a:nodejs:node.js:0.1.1
  • Nodejs Node.js 0.1.2
    cpe:2.3:a:nodejs:node.js:0.1.2
  • Nodejs Node.js 0.1.3
    cpe:2.3:a:nodejs:node.js:0.1.3
  • Nodejs Node.js 0.1.4
    cpe:2.3:a:nodejs:node.js:0.1.4
  • Nodejs Node.js 0.1.5
    cpe:2.3:a:nodejs:node.js:0.1.5
  • Nodejs Node.js 0.1.6
    cpe:2.3:a:nodejs:node.js:0.1.6
  • Nodejs Node.js 0.1.7
    cpe:2.3:a:nodejs:node.js:0.1.7
  • Nodejs Node.js 0.1.8
    cpe:2.3:a:nodejs:node.js:0.1.8
  • Nodejs Node.js 0.1.9
    cpe:2.3:a:nodejs:node.js:0.1.9
  • Nodejs Node.js 0.1.10
    cpe:2.3:a:nodejs:node.js:0.1.10
  • Nodejs Node.js 0.1.11
    cpe:2.3:a:nodejs:node.js:0.1.11
  • Nodejs Node.js 0.1.12
    cpe:2.3:a:nodejs:node.js:0.1.12
  • Nodejs Node.js 0.1.13
    cpe:2.3:a:nodejs:node.js:0.1.13
  • Nodejs Node.js 0.1.14
    cpe:2.3:a:nodejs:node.js:0.1.14
  • Nodejs Node.js 0.1.15
    cpe:2.3:a:nodejs:node.js:0.1.15
  • Nodejs Node.js 0.1.16
    cpe:2.3:a:nodejs:node.js:0.1.16
  • Nodejs Node.js 0.1.17
    cpe:2.3:a:nodejs:node.js:0.1.17
  • Nodejs Node.js 0.1.18
    cpe:2.3:a:nodejs:node.js:0.1.18
  • Nodejs Node.js 0.1.19
    cpe:2.3:a:nodejs:node.js:0.1.19
  • Nodejs Node.js 0.1.20
    cpe:2.3:a:nodejs:node.js:0.1.20
  • Nodejs Node.js 0.1.21
    cpe:2.3:a:nodejs:node.js:0.1.21
  • Nodejs Node.js 0.1.22
    cpe:2.3:a:nodejs:node.js:0.1.22
  • Nodejs Node.js 0.1.23
    cpe:2.3:a:nodejs:node.js:0.1.23
  • Nodejs Node.js 0.1.24
    cpe:2.3:a:nodejs:node.js:0.1.24
  • Nodejs Node.js 0.1.25
    cpe:2.3:a:nodejs:node.js:0.1.25
  • Nodejs Node.js 0.1.26
    cpe:2.3:a:nodejs:node.js:0.1.26
  • Nodejs Node.js 0.1.27
    cpe:2.3:a:nodejs:node.js:0.1.27
  • Nodejs Node.js 0.1.28
    cpe:2.3:a:nodejs:node.js:0.1.28
  • Nodejs Node.js 0.1.29
    cpe:2.3:a:nodejs:node.js:0.1.29
  • Nodejs Node.js 0.1.30
    cpe:2.3:a:nodejs:node.js:0.1.30
  • Nodejs Node.js 0.1.31
    cpe:2.3:a:nodejs:node.js:0.1.31
  • Nodejs Node.js 0.1.32
    cpe:2.3:a:nodejs:node.js:0.1.32
  • Nodejs Node.js 0.1.33
    cpe:2.3:a:nodejs:node.js:0.1.33
  • Nodejs Node.js 0.1.90
    cpe:2.3:a:nodejs:node.js:0.1.90
  • Nodejs Node.js 0.1.91
    cpe:2.3:a:nodejs:node.js:0.1.91
  • Nodejs Node.js 0.1.92
    cpe:2.3:a:nodejs:node.js:0.1.92
  • Nodejs Node.js 0.1.93
    cpe:2.3:a:nodejs:node.js:0.1.93
  • Nodejs Node.js 0.1.94
    cpe:2.3:a:nodejs:node.js:0.1.94
  • Nodejs Node.js 0.1.95
    cpe:2.3:a:nodejs:node.js:0.1.95
  • Nodejs Node.js 0.1.96
    cpe:2.3:a:nodejs:node.js:0.1.96
  • Nodejs Node.js 0.1.97
    cpe:2.3:a:nodejs:node.js:0.1.97
  • Nodejs Node.js 0.1.98
    cpe:2.3:a:nodejs:node.js:0.1.98
  • Nodejs Node.js 0.1.99
    cpe:2.3:a:nodejs:node.js:0.1.99
  • Nodejs Node.js 0.1.100
    cpe:2.3:a:nodejs:node.js:0.1.100
  • Nodejs Node.js 0.1.101
    cpe:2.3:a:nodejs:node.js:0.1.101
  • Nodejs Node.js 0.1.102
    cpe:2.3:a:nodejs:node.js:0.1.102
  • Nodejs Node.js 0.1.103
    cpe:2.3:a:nodejs:node.js:0.1.103
  • Nodejs Node.js 0.1.104
    cpe:2.3:a:nodejs:node.js:0.1.104
  • Nodejs Node.js 0.2.0
    cpe:2.3:a:nodejs:node.js:0.2.0
  • Nodejs Node.js 0.2.1
    cpe:2.3:a:nodejs:node.js:0.2.1
  • Nodejs Node.js 0.2.2
    cpe:2.3:a:nodejs:node.js:0.2.2
  • Nodejs Node.js 0.2.3
    cpe:2.3:a:nodejs:node.js:0.2.3
  • Nodejs Node.js 0.2.4
    cpe:2.3:a:nodejs:node.js:0.2.4
  • Nodejs Node.js 0.2.5
    cpe:2.3:a:nodejs:node.js:0.2.5
  • Nodejs Node.js 0.2.6
    cpe:2.3:a:nodejs:node.js:0.2.6
  • Nodejs Node.js 0.3.0
    cpe:2.3:a:nodejs:node.js:0.3.0
  • Nodejs Node.js 0.3.1
    cpe:2.3:a:nodejs:node.js:0.3.1
  • Nodejs Node.js 0.3.2
    cpe:2.3:a:nodejs:node.js:0.3.2
  • Nodejs Node.js 0.3.3
    cpe:2.3:a:nodejs:node.js:0.3.3
  • Nodejs Node.js 0.3.4
    cpe:2.3:a:nodejs:node.js:0.3.4
  • Nodejs Node.js 0.3.5
    cpe:2.3:a:nodejs:node.js:0.3.5
  • Nodejs Node.js 0.3.6
    cpe:2.3:a:nodejs:node.js:0.3.6
  • Nodejs Node.js 0.3.7
    cpe:2.3:a:nodejs:node.js:0.3.7
  • Nodejs Node.js 0.3.8
    cpe:2.3:a:nodejs:node.js:0.3.8
  • Nodejs Node.js 0.4.0
    cpe:2.3:a:nodejs:node.js:0.4.0
  • Nodejs Node.js 0.4.1
    cpe:2.3:a:nodejs:node.js:0.4.1
  • Nodejs Node.js 0.4.2
    cpe:2.3:a:nodejs:node.js:0.4.2
  • Nodejs Node.js 0.4.3
    cpe:2.3:a:nodejs:node.js:0.4.3
  • Nodejs Node.js 0.4.4
    cpe:2.3:a:nodejs:node.js:0.4.4
  • Nodejs Node.js 0.4.5
    cpe:2.3:a:nodejs:node.js:0.4.5
  • Nodejs Node.js 0.4.6
    cpe:2.3:a:nodejs:node.js:0.4.6
  • Nodejs Node.js 0.4.7
    cpe:2.3:a:nodejs:node.js:0.4.7
  • Nodejs Node.js 0.4.8
    cpe:2.3:a:nodejs:node.js:0.4.8
  • Nodejs Node.js 0.4.9
    cpe:2.3:a:nodejs:node.js:0.4.9
  • Nodejs Node.js 0.4.10
    cpe:2.3:a:nodejs:node.js:0.4.10
  • Nodejs Node.js 0.4.11
    cpe:2.3:a:nodejs:node.js:0.4.11
  • Nodejs Node.js 0.4.12
    cpe:2.3:a:nodejs:node.js:0.4.12
  • Nodejs Node.js 0.5.0
    cpe:2.3:a:nodejs:node.js:0.5.0
  • Nodejs Node.js 0.5.1
    cpe:2.3:a:nodejs:node.js:0.5.1
  • Nodejs Node.js 0.5.2
    cpe:2.3:a:nodejs:node.js:0.5.2
  • Nodejs Node.js 0.5.3
    cpe:2.3:a:nodejs:node.js:0.5.3
  • Nodejs Node.js 0.5.4
    cpe:2.3:a:nodejs:node.js:0.5.4
  • Nodejs Node.js 0.5.5
    cpe:2.3:a:nodejs:node.js:0.5.5
  • Nodejs Node.js 0.5.5 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:0.5.5:rc1
  • Nodejs Node.js 0.5.6
    cpe:2.3:a:nodejs:node.js:0.5.6
  • Nodejs Node.js 0.5.7
    cpe:2.3:a:nodejs:node.js:0.5.7
  • Nodejs Node.js 0.5.8
    cpe:2.3:a:nodejs:node.js:0.5.8
  • Nodejs Node.js 0.5.9
    cpe:2.3:a:nodejs:node.js:0.5.9
  • Nodejs Node.js 0.5.10
    cpe:2.3:a:nodejs:node.js:0.5.10
  • Nodejs Node.js 0.6.0
    cpe:2.3:a:nodejs:node.js:0.6.0
  • Nodejs Node.js 0.6.1
    cpe:2.3:a:nodejs:node.js:0.6.1
  • Nodejs Node.js 0.6.2
    cpe:2.3:a:nodejs:node.js:0.6.2
  • Nodejs Node.js 0.6.3
    cpe:2.3:a:nodejs:node.js:0.6.3
  • Nodejs Node.js 0.6.4
    cpe:2.3:a:nodejs:node.js:0.6.4
  • Nodejs Node.js 0.6.5
    cpe:2.3:a:nodejs:node.js:0.6.5
  • Nodejs Node.js 0.6.6
    cpe:2.3:a:nodejs:node.js:0.6.6
  • Nodejs Node.js 0.6.7
    cpe:2.3:a:nodejs:node.js:0.6.7
  • Nodejs Node.js 0.6.8
    cpe:2.3:a:nodejs:node.js:0.6.8
  • Nodejs Node.js 0.6.9
    cpe:2.3:a:nodejs:node.js:0.6.9
  • Nodejs Node.js 0.6.10
    cpe:2.3:a:nodejs:node.js:0.6.10
  • Nodejs Node.js 0.6.11
    cpe:2.3:a:nodejs:node.js:0.6.11
  • Nodejs Node.js 0.6.12
    cpe:2.3:a:nodejs:node.js:0.6.12
  • Nodejs Node.js 0.6.13
    cpe:2.3:a:nodejs:node.js:0.6.13
  • Nodejs Node.js 0.6.14
    cpe:2.3:a:nodejs:node.js:0.6.14
  • Nodejs Node.js 0.6.15
    cpe:2.3:a:nodejs:node.js:0.6.15
  • Nodejs Node.js 0.6.16
    cpe:2.3:a:nodejs:node.js:0.6.16
  • Nodejs Node.js 0.6.17
    cpe:2.3:a:nodejs:node.js:0.6.17
  • Nodejs Node.js 0.6.18
    cpe:2.3:a:nodejs:node.js:0.6.18
  • Nodejs Node.js 0.6.19
    cpe:2.3:a:nodejs:node.js:0.6.19
  • Nodejs Node.js 0.6.20
    cpe:2.3:a:nodejs:node.js:0.6.20
  • Nodejs Node.js 0.6.21
    cpe:2.3:a:nodejs:node.js:0.6.21
  • Nodejs Node.js 0.7.0
    cpe:2.3:a:nodejs:node.js:0.7.0
  • Nodejs Node.js 0.7.1
    cpe:2.3:a:nodejs:node.js:0.7.1
  • Nodejs Node.js 0.7.2
    cpe:2.3:a:nodejs:node.js:0.7.2
  • Nodejs Node.js 0.7.3
    cpe:2.3:a:nodejs:node.js:0.7.3
  • Nodejs Node.js 0.7.4
    cpe:2.3:a:nodejs:node.js:0.7.4
  • Nodejs Node.js 0.7.5
    cpe:2.3:a:nodejs:node.js:0.7.5
  • Nodejs Node.js 0.7.6
    cpe:2.3:a:nodejs:node.js:0.7.6
  • Nodejs Node.js 0.7.7
    cpe:2.3:a:nodejs:node.js:0.7.7
  • Nodejs Node.js 0.7.8
    cpe:2.3:a:nodejs:node.js:0.7.8
  • Nodejs Node.js 0.7.9
    cpe:2.3:a:nodejs:node.js:0.7.9
  • Nodejs Node.js 0.7.10
    cpe:2.3:a:nodejs:node.js:0.7.10
  • Nodejs Node.js 0.7.11
    cpe:2.3:a:nodejs:node.js:0.7.11
  • Nodejs Node.js 0.7.12
    cpe:2.3:a:nodejs:node.js:0.7.12
  • Nodejs Node.js 0.8.0
    cpe:2.3:a:nodejs:node.js:0.8.0
  • Nodejs Node.js 0.8.1
    cpe:2.3:a:nodejs:node.js:0.8.1
  • Nodejs Node.js 0.8.2
    cpe:2.3:a:nodejs:node.js:0.8.2
  • Nodejs Node.js 0.8.3
    cpe:2.3:a:nodejs:node.js:0.8.3
  • Nodejs Node.js 0.8.4
    cpe:2.3:a:nodejs:node.js:0.8.4
  • Nodejs Node.js 0.8.5
    cpe:2.3:a:nodejs:node.js:0.8.5
  • Nodejs Node.js 0.8.6
    cpe:2.3:a:nodejs:node.js:0.8.6
  • Nodejs Node.js 0.8.7
    cpe:2.3:a:nodejs:node.js:0.8.7
  • Nodejs Node.js 0.8.8
    cpe:2.3:a:nodejs:node.js:0.8.8
  • Nodejs Node.js 0.8.9
    cpe:2.3:a:nodejs:node.js:0.8.9
  • Nodejs Node.js 0.8.10
    cpe:2.3:a:nodejs:node.js:0.8.10
  • Nodejs Node.js 0.8.11
    cpe:2.3:a:nodejs:node.js:0.8.11
  • Nodejs Node.js 0.8.12
    cpe:2.3:a:nodejs:node.js:0.8.12
  • Nodejs Node.js 0.8.13
    cpe:2.3:a:nodejs:node.js:0.8.13
  • Nodejs Node.js 0.8.14
    cpe:2.3:a:nodejs:node.js:0.8.14
  • Nodejs Node.js 0.8.15
    cpe:2.3:a:nodejs:node.js:0.8.15
  • Nodejs Node.js 0.8.16
    cpe:2.3:a:nodejs:node.js:0.8.16
  • Nodejs Node.js 0.8.17
    cpe:2.3:a:nodejs:node.js:0.8.17
  • Nodejs Node.js 0.8.18
    cpe:2.3:a:nodejs:node.js:0.8.18
  • Nodejs Node.js 0.8.19
    cpe:2.3:a:nodejs:node.js:0.8.19
  • Nodejs Node.js 0.8.20
    cpe:2.3:a:nodejs:node.js:0.8.20
  • Nodejs Node.js 0.8.21
    cpe:2.3:a:nodejs:node.js:0.8.21
  • Nodejs Node.js 0.8.22
    cpe:2.3:a:nodejs:node.js:0.8.22
  • Nodejs Node.js 0.8.23
    cpe:2.3:a:nodejs:node.js:0.8.23
  • Nodejs Node.js 0.8.24
    cpe:2.3:a:nodejs:node.js:0.8.24
  • Nodejs Node.js 0.8.25
    cpe:2.3:a:nodejs:node.js:0.8.25
  • Nodejs Node.js 0.8.26
    cpe:2.3:a:nodejs:node.js:0.8.26
  • Nodejs Node.js 0.8.27
    cpe:2.3:a:nodejs:node.js:0.8.27
  • Nodejs Node.js 0.8.28
    cpe:2.3:a:nodejs:node.js:0.8.28
  • Nodejs Node.js 0.9.0
    cpe:2.3:a:nodejs:node.js:0.9.0
  • Nodejs Node.js 0.9.1
    cpe:2.3:a:nodejs:node.js:0.9.1
  • Nodejs Node.js 0.9.2
    cpe:2.3:a:nodejs:node.js:0.9.2
  • Nodejs Node.js 0.9.3
    cpe:2.3:a:nodejs:node.js:0.9.3
  • Nodejs Node.js 0.9.4
    cpe:2.3:a:nodejs:node.js:0.9.4
  • Nodejs Node.js 0.9.5
    cpe:2.3:a:nodejs:node.js:0.9.5
  • Nodejs Node.js 0.9.6
    cpe:2.3:a:nodejs:node.js:0.9.6
  • Nodejs Node.js 0.9.7
    cpe:2.3:a:nodejs:node.js:0.9.7
  • Nodejs Node.js 0.9.8
    cpe:2.3:a:nodejs:node.js:0.9.8
  • Nodejs Node.js 0.9.9
    cpe:2.3:a:nodejs:node.js:0.9.9
  • Nodejs Node.js 0.9.10
    cpe:2.3:a:nodejs:node.js:0.9.10
  • Nodejs Node.js 0.9.11
    cpe:2.3:a:nodejs:node.js:0.9.11
  • Nodejs Node.js 0.9.12
    cpe:2.3:a:nodejs:node.js:0.9.12
  • Nodejs Node.js 0.10.0
    cpe:2.3:a:nodejs:node.js:0.10.0
  • Nodejs Node.js 0.10.1
    cpe:2.3:a:nodejs:node.js:0.10.1
  • Nodejs Node.js 0.10.2
    cpe:2.3:a:nodejs:node.js:0.10.2
  • Nodejs Node.js 0.10.3
    cpe:2.3:a:nodejs:node.js:0.10.3
  • Nodejs Node.js 0.10.4
    cpe:2.3:a:nodejs:node.js:0.10.4
  • Nodejs Node.js 0.10.5
    cpe:2.3:a:nodejs:node.js:0.10.5
  • Nodejs Node.js 0.10.6
    cpe:2.3:a:nodejs:node.js:0.10.6
  • Nodejs Node.js 0.10.7
    cpe:2.3:a:nodejs:node.js:0.10.7
  • Nodejs Node.js 0.10.8
    cpe:2.3:a:nodejs:node.js:0.10.8
  • Nodejs Node.js 0.10.9
    cpe:2.3:a:nodejs:node.js:0.10.9
  • Nodejs Node.js 0.10.10
    cpe:2.3:a:nodejs:node.js:0.10.10
  • Nodejs Node.js 0.10.11
    cpe:2.3:a:nodejs:node.js:0.10.11
  • Nodejs Node.js 0.10.12
    cpe:2.3:a:nodejs:node.js:0.10.12
  • Nodejs Node.js 0.10.13
    cpe:2.3:a:nodejs:node.js:0.10.13
  • Nodejs Node.js 0.10.14
    cpe:2.3:a:nodejs:node.js:0.10.14
  • Nodejs Node.js 0.10.15
    cpe:2.3:a:nodejs:node.js:0.10.15
  • Nodejs Node.js 0.10.16
    cpe:2.3:a:nodejs:node.js:0.10.16
  • Nodejs Node.js 0.10.16-isaacs-manual
    cpe:2.3:a:nodejs:node.js:0.10.16-isaacs-manual
  • Nodejs Node.js 0.10.17
    cpe:2.3:a:nodejs:node.js:0.10.17
  • nodejs Node.js 0.10.18
    cpe:2.3:a:nodejs:node.js:0.10.18
  • Nodejs Node.js 0.10.19
    cpe:2.3:a:nodejs:node.js:0.10.19
  • Nodejs Node.js 0.10.20
    cpe:2.3:a:nodejs:node.js:0.10.20
  • Nodejs Node.js 0.10.21
    cpe:2.3:a:nodejs:node.js:0.10.21
  • Nodejs Node.js 0.10.22
    cpe:2.3:a:nodejs:node.js:0.10.22
  • Nodejs Node.js 0.10.23
    cpe:2.3:a:nodejs:node.js:0.10.23
  • Nodejs Node.js 0.10.24
    cpe:2.3:a:nodejs:node.js:0.10.24
  • Nodejs Node.js 0.10.25
    cpe:2.3:a:nodejs:node.js:0.10.25
  • Nodejs Node.js 0.10.26
    cpe:2.3:a:nodejs:node.js:0.10.26
  • Nodejs Node.js 0.10.27
    cpe:2.3:a:nodejs:node.js:0.10.27
  • Nodejs Node.js 0.10.28
    cpe:2.3:a:nodejs:node.js:0.10.28
  • Nodejs Node.js 0.10.29
    cpe:2.3:a:nodejs:node.js:0.10.29
  • Nodejs Node.js 0.10.30
    cpe:2.3:a:nodejs:node.js:0.10.30
  • Nodejs Node.js 0.10.31
    cpe:2.3:a:nodejs:node.js:0.10.31
  • Nodejs Node.js 0.10.32
    cpe:2.3:a:nodejs:node.js:0.10.32
  • Nodejs Node.js 0.10.33
    cpe:2.3:a:nodejs:node.js:0.10.33
  • Nodejs Node.js 0.10.34
    cpe:2.3:a:nodejs:node.js:0.10.34
  • Nodejs Node.js 0.10.35
    cpe:2.3:a:nodejs:node.js:0.10.35
  • Nodejs Node.js 0.10.36
    cpe:2.3:a:nodejs:node.js:0.10.36
  • Nodejs Node.js 0.10.37
    cpe:2.3:a:nodejs:node.js:0.10.37
  • Nodejs Node.js 0.10.38
    cpe:2.3:a:nodejs:node.js:0.10.38
  • Nodejs Node.js 0.10.39
    cpe:2.3:a:nodejs:node.js:0.10.39
  • Nodejs Node.js 0.10.40
    cpe:2.3:a:nodejs:node.js:0.10.40
  • Nodejs Node.js 0.10.41
    cpe:2.3:a:nodejs:node.js:0.10.41
  • Nodejs Node.js 0.10.41 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:0.10.41:rc1
  • Nodejs Node.js 0.10.42
    cpe:2.3:a:nodejs:node.js:0.10.42
  • Nodejs Node.js 0.10.43
    cpe:2.3:a:nodejs:node.js:0.10.43
  • Nodejs Node.js 0.10.44
    cpe:2.3:a:nodejs:node.js:0.10.44
  • Nodejs Node.js 0.10.45
    cpe:2.3:a:nodejs:node.js:0.10.45
  • Nodejs Node.js 0.10.46
    cpe:2.3:a:nodejs:node.js:0.10.46
  • Nodejs Node.js 0.10.47
    cpe:2.3:a:nodejs:node.js:0.10.47
  • Nodejs Node.js 0.10.48
    cpe:2.3:a:nodejs:node.js:0.10.48
  • Nodejs Node.js 0.11.0
    cpe:2.3:a:nodejs:node.js:0.11.0
  • Nodejs Node.js 0.11.1
    cpe:2.3:a:nodejs:node.js:0.11.1
  • Nodejs Node.js 0.11.2
    cpe:2.3:a:nodejs:node.js:0.11.2
  • Nodejs Node.js 0.11.3
    cpe:2.3:a:nodejs:node.js:0.11.3
  • Nodejs Node.js 0.11.4
    cpe:2.3:a:nodejs:node.js:0.11.4
  • Nodejs Node.js 0.11.5
    cpe:2.3:a:nodejs:node.js:0.11.5
  • Nodejs Node.js 0.11.6
    cpe:2.3:a:nodejs:node.js:0.11.6
  • Nodejs Node.js 0.11.7
    cpe:2.3:a:nodejs:node.js:0.11.7
  • Nodejs Node.js 0.11.8
    cpe:2.3:a:nodejs:node.js:0.11.8
  • Nodejs Node.js 0.11.9
    cpe:2.3:a:nodejs:node.js:0.11.9
  • Nodejs Node.js 0.11.10
    cpe:2.3:a:nodejs:node.js:0.11.10
  • Nodejs Node.js 0.11.11
    cpe:2.3:a:nodejs:node.js:0.11.11
  • Nodejs Node.js 0.11.12
    cpe:2.3:a:nodejs:node.js:0.11.12
  • Nodejs Node.js 0.11.13
    cpe:2.3:a:nodejs:node.js:0.11.13
  • Nodejs Node.js 0.11.14
    cpe:2.3:a:nodejs:node.js:0.11.14
  • Nodejs Node.js 0.11.15
    cpe:2.3:a:nodejs:node.js:0.11.15
  • Nodejs Node.js 0.11.16
    cpe:2.3:a:nodejs:node.js:0.11.16
  • Nodejs Node.js 0.12.0
    cpe:2.3:a:nodejs:node.js:0.12.0
  • Nodejs Node.js 0.12.1
    cpe:2.3:a:nodejs:node.js:0.12.1
  • Nodejs Node.js 0.12.2
    cpe:2.3:a:nodejs:node.js:0.12.2
  • Nodejs Node.js 0.12.3
    cpe:2.3:a:nodejs:node.js:0.12.3
  • Nodejs Node.js 0.12.4
    cpe:2.3:a:nodejs:node.js:0.12.4
  • nodejs Node.js 0.12.5
    cpe:2.3:a:nodejs:node.js:0.12.5
  • Nodejs Node.js 0.12.6
    cpe:2.3:a:nodejs:node.js:0.12.6
  • Nodejs Node.js 0.12.7
    cpe:2.3:a:nodejs:node.js:0.12.7
  • Nodejs Node.js 0.12.8
    cpe:2.3:a:nodejs:node.js:0.12.8
  • Nodejs Node.js 0.12.8 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:0.12.8:rc1
  • Nodejs Node.js 0.12.9
    cpe:2.3:a:nodejs:node.js:0.12.9
  • Nodejs Node.js 0.12.10
    cpe:2.3:a:nodejs:node.js:0.12.10
  • Nodejs Node.js 0.12.11
    cpe:2.3:a:nodejs:node.js:0.12.11
  • Nodejs Node.js 0.12.12
    cpe:2.3:a:nodejs:node.js:0.12.12
  • Nodejs Node.js 0.12.13
    cpe:2.3:a:nodejs:node.js:0.12.13
  • Nodejs Node.js 0.12.14
    cpe:2.3:a:nodejs:node.js:0.12.14
  • Nodejs Node.js 0.12.15
    cpe:2.3:a:nodejs:node.js:0.12.15
  • Nodejs Node.js 0.12.16
    cpe:2.3:a:nodejs:node.js:0.12.16
  • Nodejs Node.js 0.12.17
    cpe:2.3:a:nodejs:node.js:0.12.17
  • Nodejs Node.js 0.12.18
    cpe:2.3:a:nodejs:node.js:0.12.18
  • Nodejs Node.js 1.0.0
    cpe:2.3:a:nodejs:node.js:1.0.0
  • Nodejs Node.js 1.0.1
    cpe:2.3:a:nodejs:node.js:1.0.1
  • Nodejs Node.js 1.0.2
    cpe:2.3:a:nodejs:node.js:1.0.2
  • Nodejs Node.js 1.0.3
    cpe:2.3:a:nodejs:node.js:1.0.3
  • Nodejs Node.js 1.0.4
    cpe:2.3:a:nodejs:node.js:1.0.4
  • Nodejs Node.js 1.1.0
    cpe:2.3:a:nodejs:node.js:1.1.0
  • Nodejs Node.js 1.2.0
    cpe:2.3:a:nodejs:node.js:1.2.0
  • Nodejs Node.js 1.3.0
    cpe:2.3:a:nodejs:node.js:1.3.0
  • Nodejs Node.js 1.4.1
    cpe:2.3:a:nodejs:node.js:1.4.1
  • Nodejs Node.js 1.4.2
    cpe:2.3:a:nodejs:node.js:1.4.2
  • Nodejs Node.js 1.4.3
    cpe:2.3:a:nodejs:node.js:1.4.3
  • Nodejs Node.js 1.5.0
    cpe:2.3:a:nodejs:node.js:1.5.0
  • Nodejs Node.js 1.5.1
    cpe:2.3:a:nodejs:node.js:1.5.1
  • Nodejs Node.js 1.6.0
    cpe:2.3:a:nodejs:node.js:1.6.0
  • Nodejs Node.js 1.6.1
    cpe:2.3:a:nodejs:node.js:1.6.1
  • Nodejs Node.js 1.6.2
    cpe:2.3:a:nodejs:node.js:1.6.2
  • Nodejs Node.js 1.6.3
    cpe:2.3:a:nodejs:node.js:1.6.3
  • Nodejs Node.js 1.6.4
    cpe:2.3:a:nodejs:node.js:1.6.4
  • Nodejs Node.js 1.7.0
    cpe:2.3:a:nodejs:node.js:1.7.0
  • Nodejs Node.js 1.7.1
    cpe:2.3:a:nodejs:node.js:1.7.1
  • Nodejs Node.js 1.8.1
    cpe:2.3:a:nodejs:node.js:1.8.1
  • Nodejs Node.js 1.8.2
    cpe:2.3:a:nodejs:node.js:1.8.2
  • Nodejs Node.js 1.8.3
    cpe:2.3:a:nodejs:node.js:1.8.3
  • Nodejs Node.js 1.8.4
    cpe:2.3:a:nodejs:node.js:1.8.4
  • Nodejs Node.js 2.0.0
    cpe:2.3:a:nodejs:node.js:2.0.0
  • Nodejs Node.js 2.0.1
    cpe:2.3:a:nodejs:node.js:2.0.1
  • Nodejs Node.js 2.0.2
    cpe:2.3:a:nodejs:node.js:2.0.2
  • Nodejs Node.js 2.1.0
    cpe:2.3:a:nodejs:node.js:2.1.0
  • Nodejs Node.js 2.2.0
    cpe:2.3:a:nodejs:node.js:2.2.0
  • Nodejs Node.js 2.2.1
    cpe:2.3:a:nodejs:node.js:2.2.1
  • Nodejs Node.js 2.3.0
    cpe:2.3:a:nodejs:node.js:2.3.0
  • Nodejs Node.js 2.3.1
    cpe:2.3:a:nodejs:node.js:2.3.1
  • Nodejs Node.js 2.3.2
    cpe:2.3:a:nodejs:node.js:2.3.2
  • Nodejs Node.js 2.3.3
    cpe:2.3:a:nodejs:node.js:2.3.3
  • Nodejs Node.js 2.3.4
    cpe:2.3:a:nodejs:node.js:2.3.4
  • Nodejs Node.js 2.4.0
    cpe:2.3:a:nodejs:node.js:2.4.0
  • Nodejs Node.js 2.5.0
    cpe:2.3:a:nodejs:node.js:2.5.0
  • Nodejs Node.js 3.0.0
    cpe:2.3:a:nodejs:node.js:3.0.0
  • Nodejs Node.js 3.0.0 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:3.0.0:rc1
  • Nodejs Node.js 3.0.0 Release Candidate 2
    cpe:2.3:a:nodejs:node.js:3.0.0:rc2
  • Nodejs Node.js 3.0.0 Release Candidate 3
    cpe:2.3:a:nodejs:node.js:3.0.0:rc3
  • Nodejs Node.js 3.0.0 Release Candidate 4
    cpe:2.3:a:nodejs:node.js:3.0.0:rc4
  • Nodejs Node.js 3.0.0 Release Candidate 5
    cpe:2.3:a:nodejs:node.js:3.0.0:rc5
  • Nodejs Node.js 3.0.0 Release Candidate 6
    cpe:2.3:a:nodejs:node.js:3.0.0:rc6
  • Nodejs Node.js 3.0.0 Release Candidate 7
    cpe:2.3:a:nodejs:node.js:3.0.0:rc7
  • Nodejs Node.js 3.1.0
    cpe:2.3:a:nodejs:node.js:3.1.0
  • Nodejs Node.js 3.2.0
    cpe:2.3:a:nodejs:node.js:3.2.0
  • Nodejs Node.js 3.3.0
    cpe:2.3:a:nodejs:node.js:3.3.0
  • Nodejs Node.js 3.3.1
    cpe:2.3:a:nodejs:node.js:3.3.1
  • Nodejs Node.js 4.0.0
    cpe:2.3:a:nodejs:node.js:4.0.0
  • Nodejs Node.js 4.0.0 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:4.0.0:rc1
  • Nodejs Node.js 4.0.0 Release Candidate 2
    cpe:2.3:a:nodejs:node.js:4.0.0:rc2
  • Nodejs Node.js 4.0.0 Release Candidate 3
    cpe:2.3:a:nodejs:node.js:4.0.0:rc3
  • Nodejs Node.js 4.0.0 Release Candidate 4
    cpe:2.3:a:nodejs:node.js:4.0.0:rc4
  • Nodejs Node.js 4.0.0 Release Candidate 5
    cpe:2.3:a:nodejs:node.js:4.0.0:rc5
  • Nodejs Node.js 4.1.0
    cpe:2.3:a:nodejs:node.js:4.1.0
  • Nodejs Node.js 4.1.1
    cpe:2.3:a:nodejs:node.js:4.1.1
  • Nodejs Node.js 4.1.2
    cpe:2.3:a:nodejs:node.js:4.1.2
  • Nodejs Node.js 4.2.0
    cpe:2.3:a:nodejs:node.js:4.2.0
  • Nodejs Node.js 4.2.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.2.0:-:-:-:lts
  • Nodejs Node.js 4.2.1
    cpe:2.3:a:nodejs:node.js:4.2.1
  • Nodejs Node.js 4.2.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.2.1:-:-:-:lts
  • Nodejs Node.js 4.2.2
    cpe:2.3:a:nodejs:node.js:4.2.2
  • Nodejs Node.js 4.2.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.2.2:-:-:-:lts
  • Nodejs Node.js 4.2.2 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:4.2.2:rc1
  • Nodejs Node.js 4.2.2 Release Candidate 2
    cpe:2.3:a:nodejs:node.js:4.2.2:rc2
  • Nodejs Node.js 4.2.3
    cpe:2.3:a:nodejs:node.js:4.2.3
  • Nodejs Node.js 4.2.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.2.3:-:-:-:lts
  • Nodejs Node.js 4.2.4
    cpe:2.3:a:nodejs:node.js:4.2.4
  • Nodejs Node.js 4.2.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.2.4:-:-:-:lts
  • Nodejs Node.js 4.2.4 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:4.2.4:rc1
  • Nodejs Node.js 4.2.5
    cpe:2.3:a:nodejs:node.js:4.2.5
  • Nodejs Node.js 4.2.5 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.2.5:-:-:-:lts
  • Nodejs Node.js 4.2.6
    cpe:2.3:a:nodejs:node.js:4.2.6
  • Nodejs Node.js 4.2.6 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.2.6:-:-:-:lts
  • Nodejs Node.js 4.3.0
    cpe:2.3:a:nodejs:node.js:4.3.0
  • Nodejs Node.js 4.3.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.3.0:-:-:-:lts
  • Nodejs Node.js 4.3.1
    cpe:2.3:a:nodejs:node.js:4.3.1
  • Nodejs Node.js 4.3.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.3.1:-:-:-:lts
  • Nodejs Node.js 4.3.1 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:4.3.1:rc1
  • Nodejs Node.js 4.3.1 Release Candidate 2
    cpe:2.3:a:nodejs:node.js:4.3.1:rc2
  • Nodejs Node.js 4.3.2
    cpe:2.3:a:nodejs:node.js:4.3.2
  • Nodejs Node.js 4.3.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.3.2:-:-:-:lts
  • Nodejs Node.js 4.4.0
    cpe:2.3:a:nodejs:node.js:4.4.0
  • Nodejs Node.js 4.4.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.0:-:-:-:lts
  • Nodejs Node.js 4.4.0 Release Candidate 1
    cpe:2.3:a:nodejs:node.js:4.4.0:rc1
  • Nodejs Node.js 4.4.0 Release Candidate 2
    cpe:2.3:a:nodejs:node.js:4.4.0:rc2
  • Nodejs Node.js 4.4.0 Release Candidate 3
    cpe:2.3:a:nodejs:node.js:4.4.0:rc3
  • Nodejs Node.js 4.4.0 Release Candidate 4
    cpe:2.3:a:nodejs:node.js:4.4.0:rc4
  • Nodejs Node.js 4.4.1
    cpe:2.3:a:nodejs:node.js:4.4.1
  • Nodejs Node.js 4.4.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.1:-:-:-:lts
  • Nodejs Node.js 4.4.2
    cpe:2.3:a:nodejs:node.js:4.4.2
  • Nodejs Node.js 4.4.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.2:-:-:-:lts
  • Nodejs Node.js 4.4.3
    cpe:2.3:a:nodejs:node.js:4.4.3
  • Nodejs Node.js 4.4.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.3:-:-:-:lts
  • Nodejs Node.js 4.4.4
    cpe:2.3:a:nodejs:node.js:4.4.4
  • Nodejs Node.js 4.4.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.4:-:-:-:lts
  • Nodejs Node.js 4.4.5
    cpe:2.3:a:nodejs:node.js:4.4.5
  • Nodejs Node.js 4.4.5 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.5:-:-:-:lts
  • Nodejs Node.js 4.4.6
    cpe:2.3:a:nodejs:node.js:4.4.6
  • Nodejs Node.js 4.4.6 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.6:-:-:-:lts
  • Nodejs Node.js 4.4.7
    cpe:2.3:a:nodejs:node.js:4.4.7
  • Nodejs Node.js 4.4.7 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.4.7:-:-:-:lts
  • Nodejs Node.js 4.5.0
    cpe:2.3:a:nodejs:node.js:4.5.0
  • Nodejs Node.js 4.5.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.5.0:-:-:-:lts
  • Nodejs Node.js 4.6.0
    cpe:2.3:a:nodejs:node.js:4.6.0
  • Nodejs Node.js 4.6.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.6.0:-:-:-:lts
  • Nodejs Node.js 4.6.1
    cpe:2.3:a:nodejs:node.js:4.6.1
  • Nodejs Node.js 4.6.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.6.1:-:-:-:lts
  • Nodejs Node.js 4.6.2
    cpe:2.3:a:nodejs:node.js:4.6.2
  • Nodejs Node.js 4.6.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.6.2:-:-:-:lts
  • Nodejs Node.js 4.7.0
    cpe:2.3:a:nodejs:node.js:4.7.0
  • Nodejs Node.js 4.7.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.7.0:-:-:-:lts
  • Nodejs Node.js 4.7.1
    cpe:2.3:a:nodejs:node.js:4.7.1
  • Nodejs Node.js 4.7.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.7.1:-:-:-:lts
  • Nodejs Node.js 4.7.2
    cpe:2.3:a:nodejs:node.js:4.7.2
  • Nodejs Node.js 4.7.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.7.2:-:-:-:lts
  • Nodejs Node.js 4.7.3
    cpe:2.3:a:nodejs:node.js:4.7.3
  • Nodejs Node.js 4.7.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.7.3:-:-:-:lts
  • Nodejs Node.js 4.8.0
    cpe:2.3:a:nodejs:node.js:4.8.0
  • Nodejs Node.js 4.8.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:4.8.0:-:-:-:lts
  • Nodejs Node.js 4.8.1
    cpe:2.3:a:nodejs:node.js:4.8.1
  • Nodejs Node.js 4.8.2
    cpe:2.3:a:nodejs:node.js:4.8.2
  • Nodejs Node.js 4.8.3
    cpe:2.3:a:nodejs:node.js:4.8.3
  • nodejs Node.js 4.8.4
    cpe:2.3:a:nodejs:node.js:4.8.4
  • Nodejs Node.js 4.8.5
    cpe:2.3:a:nodejs:node.js:4.8.5
  • Nodejs Node.js 4.8.6
    cpe:2.3:a:nodejs:node.js:4.8.6
  • Nodejs Node.js 4.8.7
    cpe:2.3:a:nodejs:node.js:4.8.7
  • Nodejs Node.js 4.9.0
    cpe:2.3:a:nodejs:node.js:4.9.0
  • Nodejs Node.js 4.9.1
    cpe:2.3:a:nodejs:node.js:4.9.1
  • Nodejs Node.js 5.0.0
    cpe:2.3:a:nodejs:node.js:5.0.0
  • Nodejs Node.js 5.1.0
    cpe:2.3:a:nodejs:node.js:5.1.0
  • Nodejs Node.js 5.1.1
    cpe:2.3:a:nodejs:node.js:5.1.1
  • Nodejs Node.js 5.2.0
    cpe:2.3:a:nodejs:node.js:5.2.0
  • Nodejs Node.js 5.3.0
    cpe:2.3:a:nodejs:node.js:5.3.0
  • Nodejs Node.js 5.4.0
    cpe:2.3:a:nodejs:node.js:5.4.0
  • Nodejs Node.js 5.4.1
    cpe:2.3:a:nodejs:node.js:5.4.1
  • Nodejs Node.js 5.5.0
    cpe:2.3:a:nodejs:node.js:5.5.0
  • Nodejs Node.js 5.6.0
    cpe:2.3:a:nodejs:node.js:5.6.0
  • Nodejs Node.js 5.7.0
    cpe:2.3:a:nodejs:node.js:5.7.0
  • Nodejs Node.js 5.7.1
    cpe:2.3:a:nodejs:node.js:5.7.1
  • Nodejs Node.js 5.8.0
    cpe:2.3:a:nodejs:node.js:5.8.0
  • Nodejs Node.js 5.9.0
    cpe:2.3:a:nodejs:node.js:5.9.0
  • Nodejs Node.js 5.9.1
    cpe:2.3:a:nodejs:node.js:5.9.1
  • Nodejs Node.js 5.10.0
    cpe:2.3:a:nodejs:node.js:5.10.0
  • Nodejs Node.js 5.10.1
    cpe:2.3:a:nodejs:node.js:5.10.1
  • Nodejs Node.js 5.11.0
    cpe:2.3:a:nodejs:node.js:5.11.0
  • Nodejs Node.js 5.11.1
    cpe:2.3:a:nodejs:node.js:5.11.1
  • Nodejs Node.js 5.12.0
    cpe:2.3:a:nodejs:node.js:5.12.0
  • Nodejs Node.js 6.0.0
    cpe:2.3:a:nodejs:node.js:6.0.0
  • Nodejs Node.js 6.1.0
    cpe:2.3:a:nodejs:node.js:6.1.0
  • Nodejs Node.js 6.2.0
    cpe:2.3:a:nodejs:node.js:6.2.0
  • Nodejs Node.js 6.2.1
    cpe:2.3:a:nodejs:node.js:6.2.1
  • Nodejs Node.js 6.2.2
    cpe:2.3:a:nodejs:node.js:6.2.2
  • Nodejs Node.js 6.3.0
    cpe:2.3:a:nodejs:node.js:6.3.0
  • Nodejs Node.js 6.3.1
    cpe:2.3:a:nodejs:node.js:6.3.1
  • Nodejs Node.js 6.4.0
    cpe:2.3:a:nodejs:node.js:6.4.0
  • Nodejs Node.js 6.5.0
    cpe:2.3:a:nodejs:node.js:6.5.0
  • Nodejs Node.js 6.6.0
    cpe:2.3:a:nodejs:node.js:6.6.0
  • Nodejs Node.js 6.7.0
    cpe:2.3:a:nodejs:node.js:6.7.0
  • Nodejs Node.js 6.8.0
    cpe:2.3:a:nodejs:node.js:6.8.0
  • Nodejs Node.js 6.8.1
    cpe:2.3:a:nodejs:node.js:6.8.1
  • Nodejs Node.js 6.9.0
    cpe:2.3:a:nodejs:node.js:6.9.0
  • Nodejs Node.js 6.9.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.0:-:-:-:lts
  • Nodejs Node.js 6.9.1
    cpe:2.3:a:nodejs:node.js:6.9.1
  • Nodejs Node.js 6.9.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.1:-:-:-:lts
  • Nodejs Node.js 6.9.2
    cpe:2.3:a:nodejs:node.js:6.9.2
  • Nodejs Node.js 6.9.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.2:-:-:-:lts
  • Nodejs Node.js 6.9.3
    cpe:2.3:a:nodejs:node.js:6.9.3
  • Nodejs Node.js 6.9.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.3:-:-:-:lts
  • Nodejs Node.js 6.9.4
    cpe:2.3:a:nodejs:node.js:6.9.4
  • Nodejs Node.js 6.9.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.4:-:-:-:lts
  • Nodejs Node.js 6.9.5
    cpe:2.3:a:nodejs:node.js:6.9.5
  • Nodejs Node.js 6.9.5 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.5:-:-:-:lts
  • Nodejs Node.js 6.10.0
    cpe:2.3:a:nodejs:node.js:6.10.0
  • Nodejs Node.js 6.10.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.10.0:-:-:-:lts
  • Nodejs Node.js 6.10.1
    cpe:2.3:a:nodejs:node.js:6.10.1
  • Nodejs Node.js 6.10.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.10.1:-:-:-:lts
  • Nodejs Node.js 6.10.2
    cpe:2.3:a:nodejs:node.js:6.10.2
  • Nodejs Node.js 6.10.3
    cpe:2.3:a:nodejs:node.js:6.10.3
  • Nodejs Node.js 6.10.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.10.3:-:-:-:lts
  • Nodejs Node.js 6.11.0
    cpe:2.3:a:nodejs:node.js:6.11.0
  • Nodejs Node.js 6.11.1
    cpe:2.3:a:nodejs:node.js:6.11.1
  • nodejs Node.js 6.11.2
    cpe:2.3:a:nodejs:node.js:6.11.2
  • Nodejs Node.js 6.11.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.2:-:-:-:lts
  • nodejs Node.js 6.11.3
    cpe:2.3:a:nodejs:node.js:6.11.3
  • Nodejs Node.js 6.11.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.3:-:-:-:lts
  • nodejs Node.js 6.11.4
    cpe:2.3:a:nodejs:node.js:6.11.4
  • Nodejs Node.js 6.11.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.4:-:-:-:lts
  • Nodejs Node.js 6.11.5
    cpe:2.3:a:nodejs:node.js:6.11.5
  • Nodejs Node.js 6.11.5 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.5:-:-:-:lts
  • Nodejs Node.js 6.12.0
    cpe:2.3:a:nodejs:node.js:6.12.0
  • Nodejs Node.js 6.12.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.0:-:-:-:lts
  • Nodejs Node.js 6.12.1
    cpe:2.3:a:nodejs:node.js:6.12.1
  • Nodejs Node.js 6.12.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.1:-:-:-:lts
  • Nodejs Node.js 6.12.2
    cpe:2.3:a:nodejs:node.js:6.12.2
  • Nodejs Node.js 6.12.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.2:-:-:-:lts
  • Nodejs Node.js 6.12.3
    cpe:2.3:a:nodejs:node.js:6.12.3
  • Nodejs Node.js 6.12.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.3:-:-:-:lts
  • Nodejs Node.js 6.13.0
    cpe:2.3:a:nodejs:node.js:6.13.0
  • Nodejs Node.js 6.13.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.13.0:-:-:-:lts
  • Nodejs Node.js 6.13.1
    cpe:2.3:a:nodejs:node.js:6.13.1
  • Nodejs Node.js 6.13.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.13.1:-:-:-:lts
  • Nodejs Node.js 6.14.0
    cpe:2.3:a:nodejs:node.js:6.14.0
  • Nodejs Node.js 6.14.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.0:-:-:-:lts
  • Nodejs Node.js 6.14.1
    cpe:2.3:a:nodejs:node.js:6.14.1
  • Nodejs Node.js 6.14.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.1:-:-:-:lts
  • Nodejs Node.js 6.14.2
    cpe:2.3:a:nodejs:node.js:6.14.2
  • Nodejs Node.js 6.14.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.2:-:-:-:lts
  • Nodejs Node.js 6.14.3
    cpe:2.3:a:nodejs:node.js:6.14.3
  • Nodejs Node.js 6.14.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.3:-:-:-:lts
  • Nodejs Node.js 8.0.0
    cpe:2.3:a:nodejs:node.js:8.0.0
  • Nodejs Node.js 8.1.0
    cpe:2.3:a:nodejs:node.js:8.1.0
  • Nodejs Node.js 8.1.1
    cpe:2.3:a:nodejs:node.js:8.1.1
  • Nodejs Node.js 8.1.2
    cpe:2.3:a:nodejs:node.js:8.1.2
  • Nodejs Node.js 8.1.3
    cpe:2.3:a:nodejs:node.js:8.1.3
  • nodejs Node.js 8.1.4
    cpe:2.3:a:nodejs:node.js:8.1.4
  • nodejs Node.js 8.2.0
    cpe:2.3:a:nodejs:node.js:8.2.0
  • nodejs Node.js 8.2.1
    cpe:2.3:a:nodejs:node.js:8.2.1
  • nodejs Node.js 8.3.0
    cpe:2.3:a:nodejs:node.js:8.3.0
  • nodejs Node.js 8.4.0
    cpe:2.3:a:nodejs:node.js:8.4.0
  • Nodejs Node.js 8.5.0
    cpe:2.3:a:nodejs:node.js:8.5.0
  • nodejs Node.js 8.6.0
    cpe:2.3:a:nodejs:node.js:8.6.0
  • nodejs Node.js 8.7.0
    cpe:2.3:a:nodejs:node.js:8.7.0
  • Nodejs Node.js 8.8.0
    cpe:2.3:a:nodejs:node.js:8.8.0
  • Nodejs Node.js 8.8.1
    cpe:2.3:a:nodejs:node.js:8.8.1
  • Nodejs Node.js 8.9.0
    cpe:2.3:a:nodejs:node.js:8.9.0
  • Nodejs Node.js 8.9.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.0:-:-:-:lts
  • Nodejs Node.js 8.9.1
    cpe:2.3:a:nodejs:node.js:8.9.1
  • Nodejs Node.js 8.9.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.1:-:-:-:lts
  • Nodejs Node.js 8.9.2
    cpe:2.3:a:nodejs:node.js:8.9.2
  • Nodejs Node.js 8.9.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.2:-:-:-:lts
  • Nodejs Node.js 8.9.3
    cpe:2.3:a:nodejs:node.js:8.9.3
  • Nodejs Node.js 8.9.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.3:-:-:-:lts
  • Nodejs Node.js 8.9.4
    cpe:2.3:a:nodejs:node.js:8.9.4
  • Nodejs Node.js 8.9.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.4:-:-:-:lts
  • Nodejs Node.js 8.10.0
    cpe:2.3:a:nodejs:node.js:8.10.0
  • Nodejs Node.js 8.10.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.10.0:-:-:-:lts
  • Nodejs Node.js 8.11.0
    cpe:2.3:a:nodejs:node.js:8.11.0
  • Nodejs Node.js 8.11.1
    cpe:2.3:a:nodejs:node.js:8.11.1
  • Nodejs Node.js 8.11.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.11.1:-:-:-:lts
  • Nodejs Node.js 8.11.2
    cpe:2.3:a:nodejs:node.js:8.11.2
  • Nodejs Node.js 8.11.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.11.2:-:-:-:lts
  • Nodejs Node.js 8.11.3
    cpe:2.3:a:nodejs:node.js:8.11.3
  • Nodejs Node.js 8.11.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.11.3:-:-:-:lts
  • Nodejs Node.js 10.0.0
    cpe:2.3:a:nodejs:node.js:10.0.0
  • Nodejs Node.js 10.1.0
    cpe:2.3:a:nodejs:node.js:10.1.0
  • Nodejs Node.js 10.2.0
    cpe:2.3:a:nodejs:node.js:10.2.0
  • Nodejs Node.js 10.2.1
    cpe:2.3:a:nodejs:node.js:10.2.1
  • Nodejs Node.js 10.3.0
    cpe:2.3:a:nodejs:node.js:10.3.0
  • Nodejs Node.js 10.4.0
    cpe:2.3:a:nodejs:node.js:10.4.0
  • Nodejs Node.js 10.4.1
    cpe:2.3:a:nodejs:node.js:10.4.1
  • Nodejs Node.js 10.5.0
    cpe:2.3:a:nodejs:node.js:10.5.0
  • Nodejs Node.js 10.6.0
    cpe:2.3:a:nodejs:node.js:10.6.0
  • Nodejs Node.js 10.7.0
    cpe:2.3:a:nodejs:node.js:10.7.0
  • Nodejs Node.js 10.8.0
    cpe:2.3:a:nodejs:node.js:10.8.0
  • OpenSSL Project OpenSSL 1.0.2
    cpe:2.3:a:openssl:openssl:1.0.2
  • OpenSSL Project OpenSSL 1.0.2-beta1
    cpe:2.3:a:openssl:openssl:1.0.2:beta1
  • OpenSSL 1.0.2 Beta 2
    cpe:2.3:a:openssl:openssl:1.0.2:beta2
  • OpenSSL 1.0.2 Beta 3
    cpe:2.3:a:openssl:openssl:1.0.2:beta3
  • OpenSSL OpenSSL 1.0.2a
    cpe:2.3:a:openssl:openssl:1.0.2a
  • OpenSSL Project OpenSSL 1.0.2b
    cpe:2.3:a:openssl:openssl:1.0.2b
  • OpenSSL Project OpenSSL 1.0.2c
    cpe:2.3:a:openssl:openssl:1.0.2c
  • OpenSSL OpenSSL 1.0.2d
    cpe:2.3:a:openssl:openssl:1.0.2d
  • OpenSSL 1.0.2e
    cpe:2.3:a:openssl:openssl:1.0.2e
  • OpenSSL 1.0.2f
    cpe:2.3:a:openssl:openssl:1.0.2f
  • OpenSSL Project 1.0.2g
    cpe:2.3:a:openssl:openssl:1.0.2g
  • OpenSSL 1.0.2h
    cpe:2.3:a:openssl:openssl:1.0.2h
  • OpenSSL Project OpenSSL 1.0.2i
    cpe:2.3:a:openssl:openssl:1.0.2i
  • OpenSSL1.0.2j
    cpe:2.3:a:openssl:openssl:1.0.2j
  • OpenSSL 1.0.2k
    cpe:2.3:a:openssl:openssl:1.0.2k
  • OpenSSL 1.0.2l
    cpe:2.3:a:openssl:openssl:1.0.2l
  • OpenSSL 1.0.2m
    cpe:2.3:a:openssl:openssl:1.0.2m
  • OpenSSL Project OpenSSL 1.0.2n
    cpe:2.3:a:openssl:openssl:1.0.2n
  • OpenSSL Project OpenSSL 1.0.2o
    cpe:2.3:a:openssl:openssl:1.0.2o
  • OpenSSL Project OpenSSL 1.0.2p
    cpe:2.3:a:openssl:openssl:1.0.2p
  • OpenSSL Project OpenSSL 1.1.0
    cpe:2.3:a:openssl:openssl:1.1.0
  • OpenSSL Project OpenSSL 1.1.0
    cpe:2.3:a:openssl:openssl:1.1.0
  • OpenSSL Project OpenSSL 1.1.0 Pre1
    cpe:2.3:a:openssl:openssl:1.1.0:pre1
  • OpenSSL Project OpenSSL 1.1.0 Pre2
    cpe:2.3:a:openssl:openssl:1.1.0:pre2
  • OpenSSL Project OpenSSL 1.1.0 Pre3
    cpe:2.3:a:openssl:openssl:1.1.0:pre3
  • OpenSSL Project OpenSSL 1.1.0 Pre4
    cpe:2.3:a:openssl:openssl:1.1.0:pre4
  • OpenSSL Project OpenSSL 1.1.0 Pre5
    cpe:2.3:a:openssl:openssl:1.1.0:pre5
  • OpenSSL Project OpenSSL 1.1.0 Pre6
    cpe:2.3:a:openssl:openssl:1.1.0:pre6
  • OpenSSL Project OpenSSL 1.1.0a
    cpe:2.3:a:openssl:openssl:1.1.0a
  • OpenSSL Project OpenSSL 1.1.0b
    cpe:2.3:a:openssl:openssl:1.1.0b
  • OpenSSL Project OpenSSL 1.1.0c
    cpe:2.3:a:openssl:openssl:1.1.0c
  • OpenSSL Project OpenSSL 1.1.0d
    cpe:2.3:a:openssl:openssl:1.1.0d
  • OpenSSL Project OpenSSL 1.1.0e
    cpe:2.3:a:openssl:openssl:1.1.0e
  • OpenSSL Project OpenSSL 1.1.0f
    cpe:2.3:a:openssl:openssl:1.1.0f
  • OpenSSL 1.1.0g
    cpe:2.3:a:openssl:openssl:1.1.0g
  • OpenSSL Project OpenSSL 1.1.0h
    cpe:2.3:a:openssl:openssl:1.1.0h
  • Tenable Nessus 4.4.1.15078 (x64) 64-bit
    cpe:2.3:a:tenable:nessus:4.4.1.15078:-:-:-:-:-:x64
  • Tenable Nessus 5.2.0
    cpe:2.3:a:tenable:nessus:5.2.0
  • Tenable Nessus 5.2.1
    cpe:2.3:a:tenable:nessus:5.2.1
  • Tenable Nessus 5.2.2
    cpe:2.3:a:tenable:nessus:5.2.2
  • Tenable Nessus 5.2.3
    cpe:2.3:a:tenable:nessus:5.2.3
  • Tenable Nessus 5.2.4
    cpe:2.3:a:tenable:nessus:5.2.4
  • Tenable Nessus 5.2.5
    cpe:2.3:a:tenable:nessus:5.2.5
  • Tenable Nessus 5.2.6
    cpe:2.3:a:tenable:nessus:5.2.6
  • Tenable Nessus 5.2.7
    cpe:2.3:a:tenable:nessus:5.2.7
  • Tenable Nessus 5.2.8
    cpe:2.3:a:tenable:nessus:5.2.8
  • Tenable Nessus 5.2.9
    cpe:2.3:a:tenable:nessus:5.2.9
  • Tenable Nessus 5.2.10
    cpe:2.3:a:tenable:nessus:5.2.10
  • Tenable Nessus 5.2.11
    cpe:2.3:a:tenable:nessus:5.2.11
  • Tenable Nessus 5.2.12
    cpe:2.3:a:tenable:nessus:5.2.12
  • Tenable Nessus 6.0.0
    cpe:2.3:a:tenable:nessus:6.0.0
  • Tenable Nessus 6.0.1
    cpe:2.3:a:tenable:nessus:6.0.1
  • Tenable Nessus 6.0.2
    cpe:2.3:a:tenable:nessus:6.0.2
  • Tenable Nessus 6.1.0
    cpe:2.3:a:tenable:nessus:6.1.0
  • Tenable Nessus 6.1.1
    cpe:2.3:a:tenable:nessus:6.1.1
  • Tenable Nessus 6.1.2
    cpe:2.3:a:tenable:nessus:6.1.2
  • Tenable Nessus 6.2.0
    cpe:2.3:a:tenable:nessus:6.2.0
  • Tenable Nessus 6.2.1
    cpe:2.3:a:tenable:nessus:6.2.1
  • Tenable Nessus 6.3.0
    cpe:2.3:a:tenable:nessus:6.3.0
  • Tenable Nessus 6.3.1
    cpe:2.3:a:tenable:nessus:6.3.1
  • Tenable Nessus 6.3.2
    cpe:2.3:a:tenable:nessus:6.3.2
  • Tenable Nessus 6.3.3
    cpe:2.3:a:tenable:nessus:6.3.3
  • Tenable Nessus 6.3.4
    cpe:2.3:a:tenable:nessus:6.3.4
  • Tenable Nessus 6.3.5
    cpe:2.3:a:tenable:nessus:6.3.5
  • Tenable Nessus 6.3.6
    cpe:2.3:a:tenable:nessus:6.3.6
  • Tenable Nessus 6.3.7
    cpe:2.3:a:tenable:nessus:6.3.7
  • Tenable Nessus 6.4.0
    cpe:2.3:a:tenable:nessus:6.4.0
  • Tenable Nessus 6.4.1
    cpe:2.3:a:tenable:nessus:6.4.1
  • Tenable Nessus 6.4.2
    cpe:2.3:a:tenable:nessus:6.4.2
  • Tenable Nessus 6.4.3
    cpe:2.3:a:tenable:nessus:6.4.3
  • Tenable Nessus 6.5.0
    cpe:2.3:a:tenable:nessus:6.5.0
  • Tenable Nessus 6.5.1
    cpe:2.3:a:tenable:nessus:6.5.1
  • Tenable Nessus 6.5.2
    cpe:2.3:a:tenable:nessus:6.5.2
  • Tenable Nessus 6.5.3
    cpe:2.3:a:tenable:nessus:6.5.3
  • Tenable Nessus 6.5.4
    cpe:2.3:a:tenable:nessus:6.5.4
  • Tenable Nessus 6.5.5
    cpe:2.3:a:tenable:nessus:6.5.5
  • Tenable Nessus 6.5.6
    cpe:2.3:a:tenable:nessus:6.5.6
  • Tenable Nessus 6.6.0
    cpe:2.3:a:tenable:nessus:6.6.0
  • Tenable Nessus 6.6.1
    cpe:2.3:a:tenable:nessus:6.6.1
  • Tenable Nessus 6.6.2
    cpe:2.3:a:tenable:nessus:6.6.2
  • Tenable Nessus 6.7
    cpe:2.3:a:tenable:nessus:6.7
  • Tenable Nessus 6.7.0
    cpe:2.3:a:tenable:nessus:6.7.0
  • Tenable Nessus 6.8
    cpe:2.3:a:tenable:nessus:6.8
  • Tenable Nessus 6.8.0
    cpe:2.3:a:tenable:nessus:6.8.0
  • Tenable Nessus 6.8.1
    cpe:2.3:a:tenable:nessus:6.8.1
  • Tenable Nessus 6.8.2
    cpe:2.3:a:tenable:nessus:6.8.2
  • Tenable Nessus 6.9
    cpe:2.3:a:tenable:nessus:6.9
  • Tenable Nessus 6.9.0
    cpe:2.3:a:tenable:nessus:6.9.0
  • Tenable Nessus 6.9.1
    cpe:2.3:a:tenable:nessus:6.9.1
  • Tenable Nessus 6.9.2
    cpe:2.3:a:tenable:nessus:6.9.2
  • Tenable Nessus 6.9.3
    cpe:2.3:a:tenable:nessus:6.9.3
  • Tenable Nessus 6.10.0
    cpe:2.3:a:tenable:nessus:6.10.0
  • Tenable Nessus 6.10.1
    cpe:2.3:a:tenable:nessus:6.10.1
  • Tenable Nessus 6.10.2
    cpe:2.3:a:tenable:nessus:6.10.2
  • Tenable Nessus 6.10.3
    cpe:2.3:a:tenable:nessus:6.10.3
  • Tenable Nessus 6.10.4
    cpe:2.3:a:tenable:nessus:6.10.4
  • Tenable Nessus 6.10.5
    cpe:2.3:a:tenable:nessus:6.10.5
  • Tenable Nessus 6.10.6
    cpe:2.3:a:tenable:nessus:6.10.6
  • Tenable Nessus 6.10.7
    cpe:2.3:a:tenable:nessus:6.10.7
  • Tenable Nessus 6.10.8
    cpe:2.3:a:tenable:nessus:6.10.8
  • Tenable Nessus 6.10.9
    cpe:2.3:a:tenable:nessus:6.10.9
  • Tenable Nessus 6.11.0
    cpe:2.3:a:tenable:nessus:6.11.0
  • Tenable Nessus 6.11.1
    cpe:2.3:a:tenable:nessus:6.11.1
  • Tenable Nessus 6.11.2
    cpe:2.3:a:tenable:nessus:6.11.2
  • Tenable Nessus 6.11.3
    cpe:2.3:a:tenable:nessus:6.11.3
  • Tenable Nessus 6.12.0
    cpe:2.3:a:tenable:nessus:6.12.0
  • Tenable Nessus 7.0.0
    cpe:2.3:a:tenable:nessus:7.0.0
  • Tenable Nessus 7.0.1
    cpe:2.3:a:tenable:nessus:7.0.1
  • Tenable Nessus 7.0.2
    cpe:2.3:a:tenable:nessus:7.0.2
  • Tenable Nessus 7.0.3
    cpe:2.3:a:tenable:nessus:7.0.3
  • Tenable Nessus 7.1.0
    cpe:2.3:a:tenable:nessus:7.1.0
  • Tenable Nessus 7.1.1
    cpe:2.3:a:tenable:nessus:7.1.1
  • Tenable Nessus 7.1.2
    cpe:2.3:a:tenable:nessus:7.1.2
  • Tenable Nessus 7.1.3
    cpe:2.3:a:tenable:nessus:7.1.3
  • Tenable Nessus 7.1.4
    cpe:2.3:a:tenable:nessus:7.1.4
  • Tenable Nessus 7.2.0
    cpe:2.3:a:tenable:nessus:7.2.0
  • Tenable Nessus 7.2.1
    cpe:2.3:a:tenable:nessus:7.2.1
  • Tenable Nessus 7.2.2
    cpe:2.3:a:tenable:nessus:7.2.2
  • Tenable Nessus 8.0.0
    cpe:2.3:a:tenable:nessus:8.0.0
  • Tenable Nessus 8.0.1
    cpe:2.3:a:tenable:nessus:8.0.1
  • Tenable Nessus 8.1.0
    cpe:2.3:a:tenable:nessus:8.1.0
  • Oracle API Gateway 11.1.2.4.0
    cpe:2.3:a:oracle:api_gateway:11.1.2.4.0
  • cpe:2.3:a:oracle:application_server:0.9.8
    cpe:2.3:a:oracle:application_server:0.9.8
  • cpe:2.3:a:oracle:application_server:1.0.0
    cpe:2.3:a:oracle:application_server:1.0.0
  • cpe:2.3:a:oracle:application_server:1.0.1
    cpe:2.3:a:oracle:application_server:1.0.1
  • Oracle Enterprise Manager Base Platform 12.1.0.5.0
    cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5.0
  • Oracle Enterprise Manager Base Platform 13.2.0.0.0
    cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0
  • Oracle Enterprise Manager Base Platform 13.3.0.0.0
    cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0
  • Oracle Enterprise Manager Ops Center 12.3.3
    cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3
  • Oracle MySQL Enterprise Backup 3.12.3
    cpe:2.3:a:oracle:mysql_enterprise_backup:3.12.3
  • Oracle MySQL Enterprise Backup 3.12.4
    cpe:2.3:a:oracle:mysql_enterprise_backup:3.12.4
  • Oracle MySQL Enterprise Backup 4.0.0
    cpe:2.3:a:oracle:mysql_enterprise_backup:4.0.0
  • Oracle MySQL Enterprise Backup 4.0.1
    cpe:2.3:a:oracle:mysql_enterprise_backup:4.0.1
  • Oracle MySQL Enterprise Backup 4.0.2
    cpe:2.3:a:oracle:mysql_enterprise_backup:4.0.2
  • Oracle MySQL Enterprise Backup 4.0.3
    cpe:2.3:a:oracle:mysql_enterprise_backup:4.0.3
  • Oracle MySQL Enterprise Backup 4.1.0
    cpe:2.3:a:oracle:mysql_enterprise_backup:4.1.0
  • Oracle MySQL Enterprise Backup 4.1.1
    cpe:2.3:a:oracle:mysql_enterprise_backup:4.1.1
  • Oracle MySQL Enterprise Backup 4.1.2
    cpe:2.3:a:oracle:mysql_enterprise_backup:4.1.2
  • Oracle PeopleSoft Enterprise PeopleTools 8.55
    cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55
  • Oracle PeopleSoft Enterprise PeopleTools 8.56
    cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56
  • Oracle PeopleSoft Enterprise PeopleTools 8.57
    cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57
  • cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.4
    cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.4
  • cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.1
    cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.1
  • cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.2
    cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.2
  • cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.1
    cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.1
  • cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.2
    cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.2
  • cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:18.8
    cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:18.8
  • Oracle Tuxedo 12.1.1.0.0
    cpe:2.3:a:oracle:tuxedo:12.1.1.0.0
  • Oracle VM VirtualBox 1.6
    cpe:2.3:a:oracle:vm_virtualbox:1.6
  • Oracle VM VirtualBox 1.6.0
    cpe:2.3:a:oracle:vm_virtualbox:1.6.0
  • Oracle VM VirtualBox 1.6.2
    cpe:2.3:a:oracle:vm_virtualbox:1.6.2
  • Oracle VM VirtualBox 1.6.4
    cpe:2.3:a:oracle:vm_virtualbox:1.6.4
  • Oracle VM VirtualBox 1.6.6
    cpe:2.3:a:oracle:vm_virtualbox:1.6.6
  • Oracle VM VirtualBox 2.0
    cpe:2.3:a:oracle:vm_virtualbox:2.0
  • Oracle VM VirtualBox 2.0.0
    cpe:2.3:a:oracle:vm_virtualbox:2.0.0
  • Oracle VM VirtualBox 2.0.2
    cpe:2.3:a:oracle:vm_virtualbox:2.0.2
  • Oracle VM VirtualBox 2.0.4
    cpe:2.3:a:oracle:vm_virtualbox:2.0.4
  • Oracle VM VirtualBox 2.0.6
    cpe:2.3:a:oracle:vm_virtualbox:2.0.6
  • Oracle VM VirtualBox 2.0.8
    cpe:2.3:a:oracle:vm_virtualbox:2.0.8
  • Oracle VM VirtualBox 2.0.10
    cpe:2.3:a:oracle:vm_virtualbox:2.0.10
  • Oracle VM VirtualBox 2.0.12
    cpe:2.3:a:oracle:vm_virtualbox:2.0.12
  • Oracle VM VirtualBox 2.1
    cpe:2.3:a:oracle:vm_virtualbox:2.1
  • Oracle VM VirtualBox 2.1.0
    cpe:2.3:a:oracle:vm_virtualbox:2.1.0
  • Oracle VM VirtualBox 2.1.2
    cpe:2.3:a:oracle:vm_virtualbox:2.1.2
  • Oracle VM VirtualBox 2.1.4
    cpe:2.3:a:oracle:vm_virtualbox:2.1.4
  • Oracle VM VirtualBox 2.2
    cpe:2.3:a:oracle:vm_virtualbox:2.2
  • Oracle VM VirtualBox 2.2.0
    cpe:2.3:a:oracle:vm_virtualbox:2.2.0
  • Oracle VM VirtualBox 2.2.2
    cpe:2.3:a:oracle:vm_virtualbox:2.2.2
  • Oracle VM VirtualBox 2.2.4
    cpe:2.3:a:oracle:vm_virtualbox:2.2.4
  • Oracle VM VirtualBox 3.0
    cpe:2.3:a:oracle:vm_virtualbox:3.0
  • Oracle VM VirtualBox 3.0.0
    cpe:2.3:a:oracle:vm_virtualbox:3.0.0
  • Oracle VM VirtualBox 3.0.2
    cpe:2.3:a:oracle:vm_virtualbox:3.0.2
  • Oracle VM VirtualBox 3.0.4
    cpe:2.3:a:oracle:vm_virtualbox:3.0.4
  • Oracle VM VirtualBox 3.0.6
    cpe:2.3:a:oracle:vm_virtualbox:3.0.6
  • Oracle VM VirtualBox 3.0.8
    cpe:2.3:a:oracle:vm_virtualbox:3.0.8
  • Oracle VM VirtualBox 3.0.10
    cpe:2.3:a:oracle:vm_virtualbox:3.0.10
  • Oracle VM VirtualBox 3.0.12
    cpe:2.3:a:oracle:vm_virtualbox:3.0.12
  • Oracle VM VirtualBox 3.0.14
    cpe:2.3:a:oracle:vm_virtualbox:3.0.14
  • Oracle VM VirtualBox 3.1
    cpe:2.3:a:oracle:vm_virtualbox:3.1
  • Oracle VM VirtualBox 3.1.0
    cpe:2.3:a:oracle:vm_virtualbox:3.1.0
  • Oracle VM VirtualBox 3.1.2
    cpe:2.3:a:oracle:vm_virtualbox:3.1.2
  • Oracle VM VirtualBox 3.1.4
    cpe:2.3:a:oracle:vm_virtualbox:3.1.4
  • Oracle VM VirtualBox 3.1.6
    cpe:2.3:a:oracle:vm_virtualbox:3.1.6
  • Oracle VM VirtualBox 3.1.8
    cpe:2.3:a:oracle:vm_virtualbox:3.1.8
  • Oracle VM VirtualBox 3.2
    cpe:2.3:a:oracle:vm_virtualbox:3.2
  • Oracle VM VirtualBox 3.2.0
    cpe:2.3:a:oracle:vm_virtualbox:3.2.0
  • Oracle VM VirtualBox 3.2.2
    cpe:2.3:a:oracle:vm_virtualbox:3.2.2
  • Oracle VM VirtualBox 3.2.4
    cpe:2.3:a:oracle:vm_virtualbox:3.2.4
  • Oracle VM VirtualBox 3.2.6
    cpe:2.3:a:oracle:vm_virtualbox:3.2.6
  • Oracle VM VirtualBox 3.2.8
    cpe:2.3:a:oracle:vm_virtualbox:3.2.8
  • Oracle VM VirtualBox 3.2.10
    cpe:2.3:a:oracle:vm_virtualbox:3.2.10
  • Oracle VM VirtualBox 3.2.12
    cpe:2.3:a:oracle:vm_virtualbox:3.2.12
  • Oracle VM VirtualBox 3.2.14
    cpe:2.3:a:oracle:vm_virtualbox:3.2.14
  • Oracle VM VirtualBox 3.2.16
    cpe:2.3:a:oracle:vm_virtualbox:3.2.16
  • Oracle VM VirtualBox 3.2.18
    cpe:2.3:a:oracle:vm_virtualbox:3.2.18
  • Oracle VM VirtualBox 3.2.20
    cpe:2.3:a:oracle:vm_virtualbox:3.2.20
  • Oracle VM VirtualBox 3.2.22
    cpe:2.3:a:oracle:vm_virtualbox:3.2.22
  • Oracle VM VirtualBox 3.2.24
    cpe:2.3:a:oracle:vm_virtualbox:3.2.24
  • Oracle VM VirtualBox 4.0
    cpe:2.3:a:oracle:vm_virtualbox:4.0
  • Oracle VM VirtualBox 4.0.0
    cpe:2.3:a:oracle:vm_virtualbox:4.0.0
  • Oracle VM VirtualBox 4.0.2
    cpe:2.3:a:oracle:vm_virtualbox:4.0.2
  • Oracle VM VirtualBox 4.0.4
    cpe:2.3:a:oracle:vm_virtualbox:4.0.4
  • Oracle VM VirtualBox 4.0.6
    cpe:2.3:a:oracle:vm_virtualbox:4.0.6
  • Oracle VM VirtualBox 4.0.8
    cpe:2.3:a:oracle:vm_virtualbox:4.0.8
  • Oracle VM VirtualBox 4.0.10
    cpe:2.3:a:oracle:vm_virtualbox:4.0.10
  • Oracle VM VirtualBox 4.0.12
    cpe:2.3:a:oracle:vm_virtualbox:4.0.12
  • Oracle VM VirtualBox 4.0.14
    cpe:2.3:a:oracle:vm_virtualbox:4.0.14
  • Oracle VM VirtualBox 4.0.16
    cpe:2.3:a:oracle:vm_virtualbox:4.0.16
  • Oracle VM VirtualBox 4.0.18
    cpe:2.3:a:oracle:vm_virtualbox:4.0.18
  • Oracle VM VirtualBox 4.0.20
    cpe:2.3:a:oracle:vm_virtualbox:4.0.20
  • Oracle VM VirtualBox 4.0.22
    cpe:2.3:a:oracle:vm_virtualbox:4.0.22
  • Oracle VM VirtualBox 4.0.24
    cpe:2.3:a:oracle:vm_virtualbox:4.0.24
  • Oracle VM VirtualBox 4.0.26
    cpe:2.3:a:oracle:vm_virtualbox:4.0.26
  • Oracle VM VirtualBox 4.0.31
    cpe:2.3:a:oracle:vm_virtualbox:4.0.31
  • Oracle VM VirtualBox 4.0.32
    cpe:2.3:a:oracle:vm_virtualbox:4.0.32
  • Oracle VM Virtualbox 4.0.34
    cpe:2.3:a:oracle:vm_virtualbox:4.0.34
  • Oracle VM Virtualbox 4.0.36
    cpe:2.3:a:oracle:vm_virtualbox:4.0.36
  • Oracle VM VirtualBox 4.1.0
    cpe:2.3:a:oracle:vm_virtualbox:4.1.0
  • Oracle VM VirtualBox 4.1.2
    cpe:2.3:a:oracle:vm_virtualbox:4.1.2
  • Oracle Vm Virtualbox 4.1.4
    cpe:2.3:a:oracle:vm_virtualbox:4.1.4
  • Oracle VM VirtualBox 4.1.6
    cpe:2.3:a:oracle:vm_virtualbox:4.1.6
  • Oracle VM VirtualBox 4.1.8
    cpe:2.3:a:oracle:vm_virtualbox:4.1.8
  • Oracle VM VirtualBox 4.1.10
    cpe:2.3:a:oracle:vm_virtualbox:4.1.10
  • Oracle VM VirtualBox 4.1.12
    cpe:2.3:a:oracle:vm_virtualbox:4.1.12
  • Oracle VM VirtualBox 4.1.14
    cpe:2.3:a:oracle:vm_virtualbox:4.1.14
  • Oracle VM VirtualBox 4.1.16
    cpe:2.3:a:oracle:vm_virtualbox:4.1.16
  • Oracle VM VirtualBox 4.1.18
    cpe:2.3:a:oracle:vm_virtualbox:4.1.18
  • Oracle VM VirtualBox 4.1.20
    cpe:2.3:a:oracle:vm_virtualbox:4.1.20
  • Oracle VM VirtualBox 4.1.22
    cpe:2.3:a:oracle:vm_virtualbox:4.1.22
  • Oracle VM VirtualBox 4.1.24
    cpe:2.3:a:oracle:vm_virtualbox:4.1.24
  • Oracle VM VirtualBox 4.1.26
    cpe:2.3:a:oracle:vm_virtualbox:4.1.26
  • Oracle VM VirtualBox 4.1.28
    cpe:2.3:a:oracle:vm_virtualbox:4.1.28
  • Oracle VM VirtualBox 4.1.30
    cpe:2.3:a:oracle:vm_virtualbox:4.1.30
  • Oracle VM VirtualBox 4.1.32
    cpe:2.3:a:oracle:vm_virtualbox:4.1.32
  • Oracle VM VirtualBox 4.1.34
    cpe:2.3:a:oracle:vm_virtualbox:4.1.34
  • Oracle VM VirtualBox 4.1.39
    cpe:2.3:a:oracle:vm_virtualbox:4.1.39
  • Oracle VM VirtualBox 4.1.40
    cpe:2.3:a:oracle:vm_virtualbox:4.1.40
  • Oracle VM Virtualbox 4.1.42
    cpe:2.3:a:oracle:vm_virtualbox:4.1.42
  • Oracle VM Virtualbox 4.1.44
    cpe:2.3:a:oracle:vm_virtualbox:4.1.44
  • Oracle VM VirtualBox 4.2.0
    cpe:2.3:a:oracle:vm_virtualbox:4.2.0
  • Oracle VM VirtualBox 4.2.2
    cpe:2.3:a:oracle:vm_virtualbox:4.2.2
  • Oracle VM VirtualBox 4.2.4
    cpe:2.3:a:oracle:vm_virtualbox:4.2.4
  • Oracle VM VirtualBox 4.2.6
    cpe:2.3:a:oracle:vm_virtualbox:4.2.6
  • Oracle VM VirtualBox 4.2.8
    cpe:2.3:a:oracle:vm_virtualbox:4.2.8
  • Oracle VM VirtualBox 4.2.10
    cpe:2.3:a:oracle:vm_virtualbox:4.2.10
  • Oracle VM VirtualBox 4.2.12
    cpe:2.3:a:oracle:vm_virtualbox:4.2.12
  • Oracle VM VirtualBox 4.2.14
    cpe:2.3:a:oracle:vm_virtualbox:4.2.14
  • Oracle VM VirtualBox 4.2.16
    cpe:2.3:a:oracle:vm_virtualbox:4.2.16
  • Oracle VM VirtualBox 4.2.18
    cpe:2.3:a:oracle:vm_virtualbox:4.2.18
  • Oracle VM VirtualBox 4.2.20
    cpe:2.3:a:oracle:vm_virtualbox:4.2.20
  • Oracle VM VirtualBox 4.2.22
    cpe:2.3:a:oracle:vm_virtualbox:4.2.22
  • Oracle VM VirtualBox 4.2.24
    cpe:2.3:a:oracle:vm_virtualbox:4.2.24
  • Oracle VM VirtualBox 4.2.26
    cpe:2.3:a:oracle:vm_virtualbox:4.2.26
  • Oracle VM VirtualBox 4.2.28
    cpe:2.3:a:oracle:vm_virtualbox:4.2.28
  • Oracle VM VirtualBox 4.2.30
    cpe:2.3:a:oracle:vm_virtualbox:4.2.30
  • Oracle VM VirtualBox 4.2.31
    cpe:2.3:a:oracle:vm_virtualbox:4.2.31
  • Oracle VM VirtualBox 4.2.32
    cpe:2.3:a:oracle:vm_virtualbox:4.2.32
  • Oracle VM Virtualbox 4.2.34
    cpe:2.3:a:oracle:vm_virtualbox:4.2.34
  • Oracle VM Virtualbox 4.2.36
    cpe:2.3:a:oracle:vm_virtualbox:4.2.36
  • Oracle VM VirtualBox 4.3.0
    cpe:2.3:a:oracle:vm_virtualbox:4.3.0
  • Oracle VM VirtualBox 4.3.2
    cpe:2.3:a:oracle:vm_virtualbox:4.3.2
  • Oracle VM VirtualBox 4.3.4
    cpe:2.3:a:oracle:vm_virtualbox:4.3.4
  • Oracle VM VirtualBox 4.3.6
    cpe:2.3:a:oracle:vm_virtualbox:4.3.6
  • Oracle VM VirtualBox 4.3.8
    cpe:2.3:a:oracle:vm_virtualbox:4.3.8
  • Oracle VM VirtualBox 4.3.10
    cpe:2.3:a:oracle:vm_virtualbox:4.3.10
  • Oracle VM VirtualBox 4.3.12
    cpe:2.3:a:oracle:vm_virtualbox:4.3.12
  • Oracle VM VirtualBox 4.3.14
    cpe:2.3:a:oracle:vm_virtualbox:4.3.14
  • Oracle VM VirtualBox 4.3.16
    cpe:2.3:a:oracle:vm_virtualbox:4.3.16
  • Oracle VM VirtualBox 4.3.18
    cpe:2.3:a:oracle:vm_virtualbox:4.3.18
  • Oracle VM VirtualBox 4.3.22
    cpe:2.3:a:oracle:vm_virtualbox:4.3.22
  • Oracle VM VirtualBox 4.3.24
    cpe:2.3:a:oracle:vm_virtualbox:4.3.24
  • Oracle VM VirtualBox 4.3.26
    cpe:2.3:a:oracle:vm_virtualbox:4.3.26
  • Oracle VM VirtualBox 4.3.28
    cpe:2.3:a:oracle:vm_virtualbox:4.3.28
  • Oracle VM VirtualBox 4.3.29
    cpe:2.3:a:oracle:vm_virtualbox:4.3.29
  • Oracle VM VirtualBox 4.3.30
    cpe:2.3:a:oracle:vm_virtualbox:4.3.30
  • Oracle VM VirtualBox 4.3.32
    cpe:2.3:a:oracle:vm_virtualbox:4.3.32
  • Oracle VM Virtualbox 4.3.34
    cpe:2.3:a:oracle:vm_virtualbox:4.3.34
  • Oracle VM Virtualbox 4.3.35
    cpe:2.3:a:oracle:vm_virtualbox:4.3.35
  • Oracle VM Virtualbox 4.3.36
    cpe:2.3:a:oracle:vm_virtualbox:4.3.36
  • Oracle VM VirtualBox 4.3.38
    cpe:2.3:a:oracle:vm_virtualbox:4.3.38
  • Oracle VM VirtualBox 5.0.0
    cpe:2.3:a:oracle:vm_virtualbox:5.0.0
  • Oracle VM VirtualBox 5.0.2
    cpe:2.3:a:oracle:vm_virtualbox:5.0.2
  • Oracle VM VirtualBox 5.0.4
    cpe:2.3:a:oracle:vm_virtualbox:5.0.4
  • Oracle VM VirtualBox 5.0.6
    cpe:2.3:a:oracle:vm_virtualbox:5.0.6
  • Oracle VM VirtualBox 5.0.8
    cpe:2.3:a:oracle:vm_virtualbox:5.0.8
  • Oracle VM Virtualbox 5.0.10
    cpe:2.3:a:oracle:vm_virtualbox:5.0.10
  • Oracle VM Virtualbox 5.0.12
    cpe:2.3:a:oracle:vm_virtualbox:5.0.12
  • Oracle VM Virtualbox 5.0.13
    cpe:2.3:a:oracle:vm_virtualbox:5.0.13
  • Oracle VM Virtualbox 5.0.14
    cpe:2.3:a:oracle:vm_virtualbox:5.0.14
  • Oracle VM Virtualbox 5.0.16
    cpe:2.3:a:oracle:vm_virtualbox:5.0.16
  • Oracle VM Virtualbox 5.0.18
    cpe:2.3:a:oracle:vm_virtualbox:5.0.18
  • Oracle VM VirtualBox 5.0.20
    cpe:2.3:a:oracle:vm_virtualbox:5.0.20
  • Oracle VM VirtualBox 5.0.22
    cpe:2.3:a:oracle:vm_virtualbox:5.0.22
  • Oracle VM VirtualBox 5.0.24
    cpe:2.3:a:oracle:vm_virtualbox:5.0.24
  • Oracle VM VirtualBox 5.0.26
    cpe:2.3:a:oracle:vm_virtualbox:5.0.26
  • Oracle VM VirtualBox 5.0.27
    cpe:2.3:a:oracle:vm_virtualbox:5.0.27
  • Oracle VM VirtualBox 5.0.28
    cpe:2.3:a:oracle:vm_virtualbox:5.0.28
  • Oracle VM VirtualBox 5.0.30
    cpe:2.3:a:oracle:vm_virtualbox:5.0.30
  • Oracle VM VirtualBox 5.0.32
    cpe:2.3:a:oracle:vm_virtualbox:5.0.32
  • Oracle VM VirtualBox 5.0.34
    cpe:2.3:a:oracle:vm_virtualbox:5.0.34
  • Oracle VM VirtualBox 5.0.36
    cpe:2.3:a:oracle:vm_virtualbox:5.0.36
  • Oracle VM VirtualBox 5.0.38
    cpe:2.3:a:oracle:vm_virtualbox:5.0.38
  • Oracle VM VirtualBox 5.0.40
    cpe:2.3:a:oracle:vm_virtualbox:5.0.40
  • Oracle VM VirtualBox 5.1.0
    cpe:2.3:a:oracle:vm_virtualbox:5.1.0
  • Oracle VM VirtualBox 5.1.2
    cpe:2.3:a:oracle:vm_virtualbox:5.1.2
  • Oracle VM VirtualBox 5.1.4
    cpe:2.3:a:oracle:vm_virtualbox:5.1.4
  • Oracle VM VirtualBox 5.1.6
    cpe:2.3:a:oracle:vm_virtualbox:5.1.6
  • Oracle VM VirtualBox 5.1.7
    cpe:2.3:a:oracle:vm_virtualbox:5.1.7
  • Oracle VM VirtualBox 5.1.8
    cpe:2.3:a:oracle:vm_virtualbox:5.1.8
  • Oracle VM VirtualBox 5.1.10
    cpe:2.3:a:oracle:vm_virtualbox:5.1.10
  • Oracle VM VirtualBox 5.1.12
    cpe:2.3:a:oracle:vm_virtualbox:5.1.12
  • Oracle VM VirtualBox 5.1.14
    cpe:2.3:a:oracle:vm_virtualbox:5.1.14
  • Oracle VM VirtualBox 5.1.16
    cpe:2.3:a:oracle:vm_virtualbox:5.1.16
  • Oracle VM VirtualBox 5.1.18
    cpe:2.3:a:oracle:vm_virtualbox:5.1.18
  • Oracle VM VirtualBox 5.1.20
    cpe:2.3:a:oracle:vm_virtualbox:5.1.20
  • Oracle VM VirtualBox 5.1.22
    cpe:2.3:a:oracle:vm_virtualbox:5.1.22
  • Oracle VM VirtualBox 5.1.24
    cpe:2.3:a:oracle:vm_virtualbox:5.1.24
  • Oracle VM VirtualBox 5.1.26
    cpe:2.3:a:oracle:vm_virtualbox:5.1.26
  • Oracle VM VirtualBox 5.1.28
    cpe:2.3:a:oracle:vm_virtualbox:5.1.28
  • Oracle VM VirtualBox 5.1.30
    cpe:2.3:a:oracle:vm_virtualbox:5.1.30
  • Oracle VM VirtualBox 5.1.32
    cpe:2.3:a:oracle:vm_virtualbox:5.1.32
  • Oracle VM VirtualBox 5.1.34
    cpe:2.3:a:oracle:vm_virtualbox:5.1.34
  • Oracle VM VirtualBox 5.1.36
    cpe:2.3:a:oracle:vm_virtualbox:5.1.36
  • Oracle VM VirtualBox 5.1.38
    cpe:2.3:a:oracle:vm_virtualbox:5.1.38
  • Oracle VM VirtualBox 5.2.0
    cpe:2.3:a:oracle:vm_virtualbox:5.2.0
  • Oracle VM VirtualBox 5.2.2
    cpe:2.3:a:oracle:vm_virtualbox:5.2.2
  • Oracle VM VirtualBox 5.2.4
    cpe:2.3:a:oracle:vm_virtualbox:5.2.4
  • Oracle VM VirtualBox 5.2.6
    cpe:2.3:a:oracle:vm_virtualbox:5.2.6
  • Oracle VM VirtualBox 5.2.8
    cpe:2.3:a:oracle:vm_virtualbox:5.2.8
  • Oracle VM VirtualBox 5.2.10
    cpe:2.3:a:oracle:vm_virtualbox:5.2.10
  • Oracle VM VirtualBox 5.2.12
    cpe:2.3:a:oracle:vm_virtualbox:5.2.12
  • Oracle VM VirtualBox 5.2.14
    cpe:2.3:a:oracle:vm_virtualbox:5.2.14
  • Oracle VM VirtualBox 5.2.16
    cpe:2.3:a:oracle:vm_virtualbox:5.2.16
  • Oracle VM VirtualBox 5.2.18
    cpe:2.3:a:oracle:vm_virtualbox:5.2.18
  • Oracle VM VirtualBox 5.2.20
    cpe:2.3:a:oracle:vm_virtualbox:5.2.20
  • Oracle VM VirtualBox 5.2.22
    cpe:2.3:a:oracle:vm_virtualbox:5.2.22
  • Oracle VM VirtualBox 5.2.24
    cpe:2.3:a:oracle:vm_virtualbox:5.2.24
  • Oracle VM VirtualBox 5.2.26
    cpe:2.3:a:oracle:vm_virtualbox:5.2.26
  • Oracle VM VirtualBox 5.2.28
    cpe:2.3:a:oracle:vm_virtualbox:5.2.28
  • Oracle VM VirtualBox 5.2.32
    cpe:2.3:a:oracle:vm_virtualbox:5.2.32
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux Server 7.6
    cpe:2.3:o:redhat:enterprise_linux_server:7.6
  • Red Hat Enterprise Linux Server Advanced mission critical Update Support (AUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
  • Red Hat Enterprise Linux Server Telecommunications Update Service (TUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
CVSS
Base: 1.9
Impact:
Exploitability:
CWE CWE-200
CAPEC
  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Browser Fingerprinting
    An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.
  • Reusing Session IDs (aka Session Replay)
    This attack targets the reuse of valid session ID to spoof the target system in order to gain privileges. The attacker tries to reuse a stolen session ID used previously during a transaction to perform spoofing and session hijacking. Another name for this type of attack is Session Replay.
  • Using Slashes in Alternate Encoding
    This attack targets the encoding of the Slash characters. An attacker would try to exploit common filtering problems related to the use of the slashes characters to gain access to resources on the target host. Directory-driven systems, such as file systems and databases, typically use the slash character to indicate traversal between directories or other container components. For murky historical reasons, PCs (and, as a result, Microsoft OSs) choose to use a backslash, whereas the UNIX world typically makes use of the forward slash. The schizophrenic result is that many MS-based systems are required to understand both forms of the slash. This gives the attacker many opportunities to discover and abuse a number of common filtering problems. The goal of this pattern is to discover server software that only applies filters to one version, but not the other.
exploit-db via4
file exploits/hardware/local/45785.md
id EDB-ID:45785
last seen 2018-11-30
modified 2018-11-02
platform hardware
port
published 2018-11-02
reporter Exploit-DB
source https://www.exploit-db.com/download/45785
title Intel (Skylake / Kaby Lake) - 'PortSmash' CPU SMT Side-Channel
type local
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4355.NASL
    description Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 119792
    published 2018-12-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119792
    title Debian DSA-4355-1 : openssl1.0 - security update
  • NASL family Misc.
    NASL id VIRTUALBOX_JAN_2019_CPU.NASL
    description The version of Oracle VM VirtualBox running on the remote host is 5.2.x prior to 5.2.24 or 6.0.x prior to 6.0.2. It is, therefore, affected by multiple vulnerabilities as noted in the January 2018 Critical Patch Update advisory : - A denial of service vulnerability in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack. An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734) - Multiple unspecified vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. (CVE-2018-3309, CVE-2019-2500, CVE-2019-2520, CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2524, CVE-2019-2526, CVE-2019-2548, CVE-2019-2552) - Multiple unspecified vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to potentially expose critical or confidential data. (CVE-2019-2446, CVE-2019-2448, CVE-2019-2450, CVE-2019-2451, CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506, CVE-2019-2525, CVE-2019-2553, CVE-2019-2554, CVE-2019-2555, CVE-2019-2556) - Multiple denial of service vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to cause a denial of service condition. (CVE-2019-2508, CVE-2019-2509, CVE-2019-2527) - An denial of service vulnerabilities with the SOAP protocol in the Core component of Oracle VirtualBox could allow an unauthenticated, remote attacker, to potentially a denial of service condition. (CVE-2019-2511) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121247
    published 2019-01-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121247
    title Oracle VM VirtualBox 5.2.x < 5.2.24 / 6.0.x < 6.0.2 (Jan 2019 CPU)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4068-1.NASL
    description This update for compat-openssl098 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 119646
    published 2018-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119646
    title SUSE SLED12 / SLES12 Security Update : compat-openssl098 (SUSE-SU-2018:4068-1)
  • NASL family Web Servers
    NASL id OPENSSL_1_1_0I.NASL
    description According to its banner, the version of OpenSSL running on the remote host is 1.1.0 prior to 1.1.0i. It is, therefore, affected by a denial of service vulnerability, a cache timing side channel vulnerability, and a microarchitecture timing side channel attack.
    last seen 2019-02-21
    modified 2018-11-14
    plugin id 112120
    published 2018-08-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112120
    title OpenSSL 1.1.0 < 1.1.0i Multiple Vulnerabilities
  • NASL family Misc.
    NASL id NESSUS_TNS_2018_17.NASL
    description According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 7.1.4. It is, therefore, affected by multiple vulnerabilities: - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's key handling during a TLS handshake that causes a denial of service vulnerability due to key handling during a TLS handshake. (CVE-2018-0732) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack. An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's RSA Key generation algorithm that allows a cache timing side channel attack to recover the private key. (CVE-2018-0737) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's Simultaneous Multithreading (SMT) architectures which render it vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407)
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 120198
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120198
    title Tenable Nessus < 7.1.4 Multiple Vulnerabilities (TNS-2018-17)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1529.NASL
    description This update for compat-openssl098 fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). - CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). - Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2018-12-13
    plugin id 119641
    published 2018-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119641
    title openSUSE Security Update : compat-openssl098 (openSUSE-2018-1529)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4274-1.NASL
    description This update for openssl fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 119937
    published 2018-12-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119937
    title SUSE SLES11 Security Update : openssl (SUSE-SU-2018:4274-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3864-1.NASL
    description This update for openssl fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). CVE-2018-0737: Corrected the current error detection of the current fix (bsc#1106197). CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). Add missing timing side channel patch for DSA signature generation (bsc#1113742). Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). Non-security issues fixed: Added openssl(cli) so that the packages that required the openssl binary can require this instead of the new openssl meta package (bsc#1101470). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-23
    plugin id 119116
    published 2018-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119116
    title SUSE SLES12 Security Update : openssl (SUSE-SU-2018:3864-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3866-1.NASL
    description This update for openssl fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). Add missing timing side channel patch for DSA signature generation (bsc#1113742). Non-security issues fixed: Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119117
    published 2018-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119117
    title SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2018:3866-1)
  • NASL family Misc.
    NASL id NODEJS_2018_NOV.NASL
    description The version of Node.js installed on the remote host is 6.x prior to 6.15.0, 8.x prior to 8.14.0 or 10.x prior to 10.14.0 or 11.x prior to 11.3.0. Therefore, it is affected by multiple vulnerabilities. - OpenSSL Timing vulnerability in DSA signature generation (CVE-2018-0734). - OpenSSL Timing vulnerability in ECDSA signature generation (CVE-2018-0735). - OpenSSL Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407). - Debugger port 5858 listens on any interface by default CVE-2018-12120). - Denial of Service with large HTTP headers (CVE-2018-12121). - Slowloris HTTP Denial of Service (CVE-2018-12122). - Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123). - HTTP request splitting (CVE-2018-12116). Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 119938
    published 2018-12-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119938
    title Node.js multiple vulnerabilities (November 2018 Security Releases).
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3989-1.NASL
    description This update for openssl-1_0_0 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). Add missing timing side channel patch for DSA signature generation (bsc#1113742). Non-security issues fixed: Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209). Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119457
    published 2018-12-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119457
    title SUSE SLED12 / SLES12 Security Update : openssl-1_0_0 (SUSE-SU-2018:3989-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_6F170CF2E6B711E8A9A8B499BAEBFEAF.NASL
    description The OpenSSL project reports : Microarchitecture timing vulnerability in ECC scalar multiplication. Severity: Low OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been shown to be vulnerable to a microarchitecture timing side channel attack. An attacker with sufficient access to mount local timing attacks during ECDSA signature generation could recover the private key.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 118901
    published 2018-11-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118901
    title FreeBSD : OpenSSL -- timing vulnerability (6f170cf2-e6b7-11e8-a9a8-b499baebfeaf)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2019-0395-1.NASL
    description This update for nodejs6 to version 6.16.0 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652) CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534) CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625) CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626) CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627) CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630) CVE-2018-12123: Fixed hostname spoofing in URL parser for JavaScript protocol (bsc#1117629) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-15
    plugin id 122230
    published 2019-02-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122230
    title SUSE SLES12 Security Update : nodejs6 (SUSE-SU-2019:0395-1)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3840-1.NASL
    description Samuel Weiser discovered that OpenSSL incorrectly handled DSA signing. An attacker could possibly use this issue to perform a timing side-channel attack and recover private DSA keys. (CVE-2018-0734) Samuel Weiser discovered that OpenSSL incorrectly handled ECDSA signing. An attacker could possibly use this issue to perform a timing side-channel attack and recover private ECDSA keys. This issue only affected Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-0735) Billy Bob Brumley, Cesar Pereida Garcia, Sohaib ul Hassan, Nicola Tuveri, and Alejandro Cabrera Aldaya discovered that Simultaneous Multithreading (SMT) architectures are vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119497
    published 2018-12-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119497
    title Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : openssl, openssl1.0 vulnerabilities (USN-3840-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2019-0117-1.NASL
    description This update for nodejs4 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652) CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534) CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625) CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626) CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627) CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630) CVE-2018-12123: Fixed hostname spoofing in URL parser for JavaScript protocol (bsc#1117629) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-22
    plugin id 121292
    published 2019-01-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121292
    title SUSE SLES12 Security Update : nodejs4 (SUSE-SU-2019:0117-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4348.NASL
    description Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 119313
    published 2018-12-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119313
    title Debian DSA-4348-1 : openssl - security update
  • NASL family Web Servers
    NASL id OPENSSL_1_0_2Q.NASL
    description According to its banner, the version of OpenSSL running on the remote host is 1.0.x prior to 1.0.2q. It is, therefore, affected by a denial of service vulnerability and a cache timing side channel vulnerability.
    last seen 2019-02-21
    modified 2019-01-25
    plugin id 121383
    published 2019-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121383
    title OpenSSL 1.0.x < 1.0.2q Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1586.NASL
    description CVE-2018-0735 Samuel Weiser reported a timing vulnerability in the OpenSSL ECDSA signature generation, which might leak information to recover the private key. CVE-2018-5407 Alejandro Cabrera Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar Pereida Garcia and Nicola Tuveri reported a vulnerability to a timing side channel attack, which might be used to recover the private key. For Debian 8 'Jessie', these problems have been fixed in version 1.0.1t-1+deb8u10. We recommend that you upgrade your openssl packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119103
    published 2018-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119103
    title Debian DLA-1586-1 : openssl security update
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2018-325-01.NASL
    description New openssl packages are available for Slackware 14.2 and -current to fix security issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119113
    published 2018-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119113
    title Slackware 14.0 / 14.1 / 14.2 / current : openssl (SSA:2018-325-01)
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0199_OPENSSL.NASL
    description An update of the openssl package has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 121899
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121899
    title Photon OS 1.0: Openssl PHSA-2018-1.0-0199
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_2A86F45AFC3C11E8A41400155D006B02.NASL
    description Node.js reports : Updates are now available for all active Node.js release lines. These include fixes for the vulnerabilities identified in the initial announcement. They also include upgrades of Node.js 6 and 8 to OpenSSL 1.0.2q, and upgrades of Node.js 10 and 11 to OpenSSL 1.1.0j. We recommend that all Node.js users upgrade to a version listed below as soon as possible. Debugger port 5858 listens on any interface by default (CVE-2018-12120) All versions of Node.js 6 are vulnerable and the severity is HIGH. When the debugger is enabled with node --debug or node debug, it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as node --debug=localhost. The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable. Denial of Service with large HTTP headers (CVE-2018-12121) All versions of 6 and later are vulnerable and the severity is HIGH. By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer. The total size of HTTP headers received by Node.js now must not exceed 8192 bytes. 'Slowloris' HTTP Denial of Service (CVE-2018-12122) All versions of Node.js 6 and later are vulnerable and the severity is LOW. An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time. Attack potential is mitigated by the use of a load balancer or other proxy layer. A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with server.headersTimeout. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with server.setTimeout(), this aids in protecting against excessive resource retention and possible Denial of Service. Hostname spoofing in URL parser for JavaScript protocol (CVE-2018-12123) All versions of Node.js 6 and later are vulnerable and the severity is LOW. If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case 'javascript:' (e.g. 'javAscript:') protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect. HTTP request splitting (CVE-2018-12116) Node.js 6 and 8 are vulnerable and the severity is MEDIUM. If Node.js can be convinced to use unsanitized user-provided Unicode data for the path option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server. OpenSSL Timing vulnerability in ECDSA signature generation (CVE-2018-0735) The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key. OpenSSL Timing vulnerability in DSA signature generation (CVE-2018-0734) The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key. OpenSSL Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407) OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been shown to be vulnerable to a microarchitecture timing side-channel attack. An attacker with sufficient access to mount local timing attacks during ECDSA signature generation could recover the private key.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 119511
    published 2018-12-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119511
    title FreeBSD : node.js -- multiple vulnerabilities (2a86f45a-fc3c-11e8-a414-00155d006b02)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1464.NASL
    description This update for openssl fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). - Add missing timing side channel patch for DSA signature generation (bsc#1113742). Non-security issues fixed : - Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209). This update was imported from the SUSE:SLE-12-SP2:Update update project.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119139
    published 2018-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119139
    title openSUSE Security Update : openssl (openSUSE-2018-1464)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1518.NASL
    description This update for openssl-1_0_0 fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-5407: Added elliptic curve scalar multiplication timing attack defenses that fixes 'PortSmash' (bsc#1113534). Non-security issues fixed : - Added missing timing side channel patch for DSA signature generation (bsc#1113742). - Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078). - Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209) This update was imported from the SUSE:SLE-15:Update update project.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119547
    published 2018-12-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119547
    title openSUSE Security Update : openssl-1_0_0 (openSUSE-2018-1518)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4001-1.NASL
    description This update for openssl-1_0_0 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Added elliptic curve scalar multiplication timing attack defenses that fixes 'PortSmash' (bsc#1113534). Non-security issues fixed: Added missing timing side channel patch for DSA signature generation (bsc#1113742). Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078). Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 120180
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120180
    title SUSE SLED15 / SLES15 Security Update : openssl-1_0_0 (SUSE-SU-2018:4001-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-88.NASL
    description This update for nodejs4 fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652) - CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534) - CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625) - CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626) - CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627) - CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630) - CVE-2018-12123: Fixed hostname spoofing in URL parser for JavaScript protocol (bsc#1117629) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2019-01-28
    plugin id 121415
    published 2019-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121415
    title openSUSE Security Update : nodejs4 (openSUSE-2019-88)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1434.NASL
    description According to the version of the openssl110f packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information.(CVE-2018-5407) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 119923
    published 2018-12-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119923
    title EulerOS 2.0 SP3 : openssl110f (EulerOS-SA-2018-1434)
  • NASL family Misc.
    NASL id NESSUS_TNS_2018_16.NASL
    description According to its self-reported version, the Tenable Nessus application running on the remote host is 8.x prior to 8.1.1. It is, therefore, affected by multiple vulnerabilities: - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack. An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's Simultaneous Multithreading (SMT) architectures which render it vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407)
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 120197
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120197
    title Tenable Nessus < 8.1.1 Multiple Vulnerabilities (TNS-2018-16)
redhat via4
advisories
  • bugzilla
    id 1645695
    title CVE-2018-5407 openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    • OR
      • AND
        • comment openssl is earlier than 1:1.0.2k-16.el7_6.1
          oval oval:com.redhat.rhsa:tst:20190483013
        • comment openssl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100888006
      • AND
        • comment openssl-devel is earlier than 1:1.0.2k-16.el7_6.1
          oval oval:com.redhat.rhsa:tst:20190483011
        • comment openssl-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100888012
      • AND
        • comment openssl-libs is earlier than 1:1.0.2k-16.el7_6.1
          oval oval:com.redhat.rhsa:tst:20190483007
        • comment openssl-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20140679014
      • AND
        • comment openssl-perl is earlier than 1:1.0.2k-16.el7_6.1
          oval oval:com.redhat.rhsa:tst:20190483005
        • comment openssl-perl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100888008
      • AND
        • comment openssl-static is earlier than 1:1.0.2k-16.el7_6.1
          oval oval:com.redhat.rhsa:tst:20190483009
        • comment openssl-static is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100888010
    rhsa
    id RHSA-2019:0483
    released 2019-03-12
    severity Moderate
    title RHSA-2019:0483: openssl security and bug fix update (Moderate)
  • rhsa
    id RHSA-2019:0651
  • rhsa
    id RHSA-2019:0652
rpms
  • openssl-1:1.0.2k-16.el7_6.1
  • openssl-devel-1:1.0.2k-16.el7_6.1
  • openssl-libs-1:1.0.2k-16.el7_6.1
  • openssl-perl-1:1.0.2k-16.el7_6.1
  • openssl-static-1:1.0.2k-16.el7_6.1
refmap via4
bid 105897
confirm
debian
  • DSA-4348
  • DSA-4355
exploit-db 45785
gentoo GLSA-201903-10
misc
mlist [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update
ubuntu USN-3840-1
the hacker news via4
id THN:ED6AA651CF0924A51404298103765C4C
last seen 2018-11-04
modified 2018-11-04
published 2018-11-04
reporter The Hacker News
source https://thehackernews.com/2018/11/portsmash-intel-vulnerability.html
title New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data
Last major update 15-11-2018 - 16:29
Published 15-11-2018 - 16:29
Last modified 23-07-2019 - 19:15
Back to Top