ID CVE-2009-3555
Summary The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
References
Vulnerable Configurations
  • cpe:2.3:a:openssl:openssl:1.0:*:openvms:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0:*:openvms:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.15.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.15.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:1.99:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:1.99:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0:alpha9:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0:alpha9:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.24:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.24:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.25:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.25:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.26:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.26:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.27:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.27:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.29:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.29:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.30:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.30:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.31:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.31:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.33:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.33:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.34:-:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.34:-:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.62:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.62:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.65:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.65:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:-:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:-:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.3:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.3:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.3:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.3:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.3:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.3:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5a:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5a:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6d:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6d:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6d:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6d:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:-:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:-:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:beta4:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:beta4:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:beta5:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:beta5:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:beta6:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:beta6:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8c-1:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8c-1:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8g-9:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8g-9:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:-:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:-:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.6:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.7:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.8:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.9:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.10:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.5:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.6:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.7:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.8:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.9:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.9:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.11.10:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.11.10:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.12:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.12.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.12.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.12.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.12.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:nss:3.12.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:nss:3.12.4:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.12:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.13:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.13:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.14:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.15:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.16:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.16:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.17:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.18:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.18:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.19:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.19:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.20:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.20:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.21:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.21:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.22:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.22:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.23:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.23:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.24:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.24:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.25:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.25:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.26:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.26:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.27:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.27:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.28:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.28:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.29:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.29:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.30:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.30:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.31:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.31:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.32:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.32:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.33:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.33:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.34:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.34:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.35:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.35:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.36:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.36:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.37:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.37:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.38:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.38:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.39:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.39:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.40:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.40:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.41:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.41:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.42:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.42:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.43:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.43:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.44:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.44:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.1.45:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.1.45:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.13:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.13:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.14:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.15:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.17:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.17:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.18:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.18:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.19:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.19:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.20:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.20:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.21:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.21:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.22:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.22:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.23:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.23:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.24:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.24:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.25:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.25:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.26:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.26:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.27:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.27:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.28:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.28:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.29:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.29:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.30:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.30:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.31:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.31:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.32:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.32:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.33:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.33:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.34:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.34:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.35:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.35:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.36:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.36:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.37:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.37:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.38:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.38:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.39:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.39:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.40:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.40:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.41:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.41:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.42:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.42:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.43:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.43:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.44:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.44:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.45:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.45:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.46:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.46:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.47:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.47:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.48:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.48:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.49:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.49:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.50:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.50:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.51:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.51:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.52:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.52:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.53:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.53:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.54:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.54:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.55:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.55:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.56:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.56:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.57:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.57:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.58:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.58:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.59:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.59:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.60:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.60:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.3.61:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.3.61:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.13:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.13:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.4.14:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.4.14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.14:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.15:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.15:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.16:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.16:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.17:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.17:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.18:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.18:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.19:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.19:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.20:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.20:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.21:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.21:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.22:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.22:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.23:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.23:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.24:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.24:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.25:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.25:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.26:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.26:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.27:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.27:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.28:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.28:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.29:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.29:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.30:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.30:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.31:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.31:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.32:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.32:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.33:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.33:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.34:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.34:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.35:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.35:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.36:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.36:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.37:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.37:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.5.38:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.5.38:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.12:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.13:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.13:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.14:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.15:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.15:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.16:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.16:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.17:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.17:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.18:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.18:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.19:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.19:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.20:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.20:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.21:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.21:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.22:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.22:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.23:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.23:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.24:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.24:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.25:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.25:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.26:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.26:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.27:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.27:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.28:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.28:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.29:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.29:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.30:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.30:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.31:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.31:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.32:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.32:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.33:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.33:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.34:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.34:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.35:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.35:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.36:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.36:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.37:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.37:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.38:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.38:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.6.39:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.6.39:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.12:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.12:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.13:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.13:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.14:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.15:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.15:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.16:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.16:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.17:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.17:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.18:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.18:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.19:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.19:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.20:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.20:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.21:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.21:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.22:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.22:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.23:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.23:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.24:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.24:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.25:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.25:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.26:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.26:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.27:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.27:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.28:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.28:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.29:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.29:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.30:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.30:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.31:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.31:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.32:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.32:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.33:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.33:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.34:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.34:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.35:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.35:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.36:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.36:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.37:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.37:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.38:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.38:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.39:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.39:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.40:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.40:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.41:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.41:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.42:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.42:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.43:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.43:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.44:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.44:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.45:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.45:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.46:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.46:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.47:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.47:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.48:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.48:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.49:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.49:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.50:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.50:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.51:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.51:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.52:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.52:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.53:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.53:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.54:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.54:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.55:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.55:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.56:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.56:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.57:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.57:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.58:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.58:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.59:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.59:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.60:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.60:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.61:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.61:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.62:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.62:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.63:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.63:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.64:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.64:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.65:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.65:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.66:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.66:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.67:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.67:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.68:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.68:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.7.69:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.69:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.12:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.12:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.13:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.15:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.15:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.16:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.16:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.17:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.17:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.18:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.18:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.19:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.19:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.20:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.20:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.21:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.21:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:0.8.22:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.8.22:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 13-02-2023 - 02:20)
Impact:
Exploitability:
CWE CWE-295
CAPEC
  • Creating a Rogue Certification Authority Certificate
    An adversary exploits a weakness in the MD5 hash algorithm (weak collision resistance) to generate a certificate signing request (CSR) that contains collision blocks in the "to be signed" part. The adversary specially crafts two different, but valid X.509 certificates that when hashed with the MD5 algorithm would yield the same value. The adversary then sends the CSR for one of the certificates to the Certification Authority which uses the MD5 hashing algorithm. That request is completely valid and the Certificate Authority issues an X.509 certificate to the adversary which is signed with its private key. An adversary then takes that signed blob and inserts it into another X.509 certificate that the attacker generated. Due to the MD5 collision, both certificates, though different, hash to the same value and so the signed blob works just as well in the second certificate. The net effect is that the adversary's second X.509 certificate, which the Certification Authority has never seen, is now signed and validated by that Certification Authority. To make the attack more interesting, the second certificate could be not just a regular certificate, but rather itself a signing certificate. Thus the adversary is able to start their own Certification Authority that is anchored in its root of trust in the legitimate Certification Authority that has signed the attackers' first X.509 certificate. If the original Certificate Authority was accepted by default by browsers, so will now the Certificate Authority set up by the adversary and of course any certificates that it signs. So the adversary is now able to generate any SSL certificates to impersonate any web server, and the user's browser will not issue any warning to the victim. This can be used to compromise HTTPS communications and other types of systems where PKI and X.509 certificates may be used (e.g., VPN, IPSec).
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:P
msbulletin via4
bulletin_id MS10-049
bulletin_url
date 2010-08-10T00:00:00
impact Remote Code Execution
knowledgebase_id 980436
knowledgebase_url
severity Critical
title Vulnerabilities in SChannel could allow Remote Code Execution
oval via4
  • accepted 2013-04-29T04:01:28.016-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description attack, aka the "Project Mogul" issue.
    family unix
    id oval:org.mitre.oval:def:10088
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title aka the "Project Mogul" issue.
    version 31
  • accepted 2010-09-13T04:00:12.331-04:00
    class vulnerability
    contributors
    name Chandan M C
    organization Hewlett-Packard
    definition_extensions
    • comment Solaris 10 (SPARC) is installed
      oval oval:org.mitre.oval:def:1440
    • comment Solaris 10 (SPARC) is installed
      oval oval:org.mitre.oval:def:1440
    • comment Solaris 10 (x86) is installed
      oval oval:org.mitre.oval:def:1926
    description The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    family unix
    id oval:org.mitre.oval:def:11578
    status accepted
    submitted 2010-08-04T16:24:18.000-05:00
    title Security Vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer 3.0 (SSLv3) Protocols Involving Handshake Renegotiation Affects OpenSSL
    version 37
  • accepted 2011-01-10T04:00:05.606-05:00
    class vulnerability
    contributors
    name Yamini Mohan R
    organization Hewlett-Packard
    definition_extensions
    • comment IBM AIX 5.3 is installed
      oval oval:org.mitre.oval:def:5325
    • comment IBM AIX 5.3 is installed
      oval oval:org.mitre.oval:def:5325
    • comment IBM AIX 5.2 is installed
      oval oval:org.mitre.oval:def:5189
    description The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    family unix
    id oval:org.mitre.oval:def:11617
    status accepted
    submitted 2010-11-30T15:08:26.000-05:00
    title AIX OpenSSL session renegotiation vulnerability
    version 45
  • accepted 2014-10-06T04:04:26.964-04:00
    class vulnerability
    contributors
    • name J. Daniel Brown
      organization DTCC
    • name Dragos Prisaca
      organization Symantec Corporation
    • name Sergey Artykhov
      organization ALTX-SOFT
    • name Sergey Artykhov
      organization ALTX-SOFT
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    • name Richard Helbing
      organization baramundi software
    • name Evgeniy Pavlov
      organization ALTX-SOFT
    • name Evgeniy Pavlov
      organization ALTX-SOFT
    • name Maria Mikhno
      organization ALTX-SOFT
    • name Evgeniy Pavlov
      organization ALTX-SOFT
    • name Evgeniy Pavlov
      organization ALTX-SOFT
    • name Evgeniy Pavlov
      organization ALTX-SOFT
    • name Evgeniy Pavlov
      organization ALTX-SOFT
    definition_extensions
    • comment Mozilla Firefox Mainline release is installed
      oval oval:org.mitre.oval:def:22259
    • comment Mozilla Seamonkey is installed
      oval oval:org.mitre.oval:def:6372
    • comment Mozilla Thunderbird Mainline release is installed
      oval oval:org.mitre.oval:def:22093
    • comment Microsoft Windows XP (32-bit) is installed
      oval oval:org.mitre.oval:def:1353
    • comment Microsoft Windows XP x64 is installed
      oval oval:org.mitre.oval:def:15247
    • comment Microsoft Windows Server 2003 (32-bit) is installed
      oval oval:org.mitre.oval:def:1870
    • comment Microsoft Windows Server 2003 (x64) is installed
      oval oval:org.mitre.oval:def:730
    • comment Microsoft Windows Server 2003 (ia64) Gold is installed
      oval oval:org.mitre.oval:def:396
    • comment Microsoft Windows Vista (32-bit) is installed
      oval oval:org.mitre.oval:def:1282
    • comment Microsoft Windows Vista x64 Edition is installed
      oval oval:org.mitre.oval:def:2041
    • comment Microsoft Windows Server 2008 (32-bit) is installed
      oval oval:org.mitre.oval:def:4870
    • comment Microsoft Windows Server 2008 (64-bit) is installed
      oval oval:org.mitre.oval:def:5356
    • comment Microsoft Windows Server 2008 (ia-64) is installed
      oval oval:org.mitre.oval:def:5667
    • comment Microsoft Windows Vista (32-bit) is installed
      oval oval:org.mitre.oval:def:1282
    • comment Microsoft Windows Vista x64 Edition is installed
      oval oval:org.mitre.oval:def:2041
    • comment Microsoft Windows Server 2008 (32-bit) is installed
      oval oval:org.mitre.oval:def:4870
    • comment Microsoft Windows Server 2008 (64-bit) is installed
      oval oval:org.mitre.oval:def:5356
    • comment Microsoft Windows Server 2008 (ia-64) is installed
      oval oval:org.mitre.oval:def:5667
    • comment Microsoft Windows 7 (32-bit) is installed
      oval oval:org.mitre.oval:def:6165
    • comment Microsoft Windows 7 x64 Edition is installed
      oval oval:org.mitre.oval:def:5950
    • comment Microsoft Windows Server 2008 R2 x64 Edition is installed
      oval oval:org.mitre.oval:def:6438
    • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition is installed
      oval oval:org.mitre.oval:def:5954
    description The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    family windows
    id oval:org.mitre.oval:def:7315
    status accepted
    submitted 2010-04-05T10:30:00.000-05:00
    title TLS/SSL Renegotiation Vulnerability
    version 105
  • accepted 2014-01-20T04:01:35.276-05:00
    class vulnerability
    contributors
    • name Varun
      organization Hewlett-Packard
    • name Chris Coffin
      organization The MITRE Corporation
    definition_extensions
    comment VMware ESX Server 4.0 is installed
    oval oval:org.mitre.oval:def:6293
    description The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    family unix
    id oval:org.mitre.oval:def:7478
    status accepted
    submitted 2010-10-04T11:07:15.000-05:00
    title VMware ESX, Service Console update for OpenSSL, GnuTLS, NSS and NSPR.
    version 7
  • accepted 2010-03-01T04:00:13.620-05:00
    class vulnerability
    contributors
    name Pai Peng
    organization Hewlett-Packard
    definition_extensions
    • comment Solaris 8 (SPARC) is installed
      oval oval:org.mitre.oval:def:1539
    • comment Solaris 9 (SPARC) is installed
      oval oval:org.mitre.oval:def:1457
    • comment Solaris 10 (SPARC) is installed
      oval oval:org.mitre.oval:def:1440
    • comment Solaris 9 (x86) is installed
      oval oval:org.mitre.oval:def:1683
    • comment Solaris 10 (x86) is installed
      oval oval:org.mitre.oval:def:1926
    description The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    family unix
    id oval:org.mitre.oval:def:7973
    status accepted
    submitted 2010-01-19T17:52:34.000-05:00
    title Security Vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer 3.0 (SSLv3) Protocols Involving Handshake Renegotiation Affects Applications Utilizing Network Security Services (NSS)
    version 35
  • accepted 2015-04-20T04:02:38.278-04:00
    class vulnerability
    contributors
    • name Pai Peng
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    family unix
    id oval:org.mitre.oval:def:8366
    status accepted
    submitted 2010-03-23T16:01:39.000-04:00
    title HP-UX Running Apache, Remote Unauthorized Data Injection, Denial of Service (DoS)
    version 48
  • accepted 2015-04-20T04:02:39.904-04:00
    class vulnerability
    contributors
    • name Pai Peng
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    family unix
    id oval:org.mitre.oval:def:8535
    status accepted
    submitted 2010-03-23T16:01:39.000-04:00
    title HP-UX Running OpenSSL, Remote Unauthorized Data Injection, Denial of Service (DoS)
    version 48
redhat via4
advisories
  • bugzilla
    id 533125
    title CVE-2009-3555 TLS: MITM attacks via session renegotiation
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment httpd is earlier than 0:2.2.3-31.el5_4.2
            oval oval:com.redhat.rhsa:tst:20091579001
          • comment httpd is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070556002
        • AND
          • comment httpd-devel is earlier than 0:2.2.3-31.el5_4.2
            oval oval:com.redhat.rhsa:tst:20091579003
          • comment httpd-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070556004
        • AND
          • comment httpd-manual is earlier than 0:2.2.3-31.el5_4.2
            oval oval:com.redhat.rhsa:tst:20091579005
          • comment httpd-manual is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070556006
        • AND
          • comment mod_ssl is earlier than 1:2.2.3-31.el5_4.2
            oval oval:com.redhat.rhsa:tst:20091579007
          • comment mod_ssl is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070556008
    rhsa
    id RHSA-2009:1579
    released 2009-11-11
    severity Moderate
    title RHSA-2009:1579: httpd security update (Moderate)
  • bugzilla
    id 533125
    title CVE-2009-3555 TLS: MITM attacks via session renegotiation
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • comment httpd is earlier than 0:2.0.52-41.ent.6
            oval oval:com.redhat.rhsa:tst:20091580001
          • comment httpd is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060159002
        • AND
          • comment httpd-devel is earlier than 0:2.0.52-41.ent.6
            oval oval:com.redhat.rhsa:tst:20091580003
          • comment httpd-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060159004
        • AND
          • comment httpd-manual is earlier than 0:2.0.52-41.ent.6
            oval oval:com.redhat.rhsa:tst:20091580005
          • comment httpd-manual is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060159006
        • AND
          • comment httpd-suexec is earlier than 0:2.0.52-41.ent.6
            oval oval:com.redhat.rhsa:tst:20091580007
          • comment httpd-suexec is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060159008
        • AND
          • comment mod_ssl is earlier than 1:2.0.52-41.ent.6
            oval oval:com.redhat.rhsa:tst:20091580009
          • comment mod_ssl is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060159010
    rhsa
    id RHSA-2009:1580
    released 2009-11-11
    severity Moderate
    title RHSA-2009:1580: httpd security update (Moderate)
  • bugzilla
    id 533125
    title CVE-2009-3555 TLS: MITM attacks via session renegotiation
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • comment openssl is earlier than 0:0.9.7a-43.17.el4_8.5
            oval oval:com.redhat.rhsa:tst:20100163001
          • comment openssl is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060661004
        • AND
          • comment openssl-devel is earlier than 0:0.9.7a-43.17.el4_8.5
            oval oval:com.redhat.rhsa:tst:20100163003
          • comment openssl-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060661006
        • AND
          • comment openssl-perl is earlier than 0:0.9.7a-43.17.el4_8.5
            oval oval:com.redhat.rhsa:tst:20100163005
          • comment openssl-perl is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060661008
    rhsa
    id RHSA-2010:0163
    released 2010-03-25
    severity Moderate
    title RHSA-2010:0163: openssl security update (Moderate)
  • bugzilla
    id 533125
    title CVE-2009-3555 TLS: MITM attacks via session renegotiation
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • comment openssl097a is earlier than 0:0.9.7a-9.el5_4.2
        oval oval:com.redhat.rhsa:tst:20100164001
      • comment openssl097a is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhsa:tst:20090004011
    rhsa
    id RHSA-2010:0164
    released 2010-03-25
    severity Moderate
    title RHSA-2010:0164: openssl097a security update (Moderate)
  • bugzilla
    id 533125
    title CVE-2009-3555 TLS: MITM attacks via session renegotiation
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • comment nspr is earlier than 0:4.8.4-1.1.el4_8
            oval oval:com.redhat.rhsa:tst:20100165001
          • comment nspr is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081036008
        • AND
          • comment nspr-devel is earlier than 0:4.8.4-1.1.el4_8
            oval oval:com.redhat.rhsa:tst:20100165003
          • comment nspr-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20081036010
        • AND
          • comment nss is earlier than 0:3.12.6-1.el4_8
            oval oval:com.redhat.rhsa:tst:20100165005
          • comment nss is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080978004
        • AND
          • comment nss-devel is earlier than 0:3.12.6-1.el4_8
            oval oval:com.redhat.rhsa:tst:20100165007
          • comment nss-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080978006
        • AND
          • comment nss-tools is earlier than 0:3.12.6-1.el4_8
            oval oval:com.redhat.rhsa:tst:20100165009
          • comment nss-tools is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20090256008
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment nspr is earlier than 0:4.8.4-1.el5_4
            oval oval:com.redhat.rhsa:tst:20100165012
          • comment nspr is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20150925002
        • AND
          • comment nspr-devel is earlier than 0:4.8.4-1.el5_4
            oval oval:com.redhat.rhsa:tst:20100165014
          • comment nspr-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20150925004
        • AND
          • comment nss is earlier than 0:3.12.6-1.el5_4
            oval oval:com.redhat.rhsa:tst:20100165016
          • comment nss is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20150925006
        • AND
          • comment nss-devel is earlier than 0:3.12.6-1.el5_4
            oval oval:com.redhat.rhsa:tst:20100165018
          • comment nss-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20150925008
        • AND
          • comment nss-pkcs11-devel is earlier than 0:3.12.6-1.el5_4
            oval oval:com.redhat.rhsa:tst:20100165020
          • comment nss-pkcs11-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20150925010
        • AND
          • comment nss-tools is earlier than 0:3.12.6-1.el5_4
            oval oval:com.redhat.rhsa:tst:20100165022
          • comment nss-tools is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20150925012
    rhsa
    id RHSA-2010:0165
    released 2010-03-25
    severity Moderate
    title RHSA-2010:0165: nss security update (Moderate)
  • bugzilla
    id 533125
    title CVE-2009-3555 TLS: MITM attacks via session renegotiation
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment gnutls is earlier than 0:1.4.1-3.el5_4.8
            oval oval:com.redhat.rhsa:tst:20100166001
          • comment gnutls is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20120319002
        • AND
          • comment gnutls-devel is earlier than 0:1.4.1-3.el5_4.8
            oval oval:com.redhat.rhsa:tst:20100166003
          • comment gnutls-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20120319004
        • AND
          • comment gnutls-utils is earlier than 0:1.4.1-3.el5_4.8
            oval oval:com.redhat.rhsa:tst:20100166005
          • comment gnutls-utils is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20120319006
    rhsa
    id RHSA-2010:0166
    released 2010-03-25
    severity Moderate
    title RHSA-2010:0166: gnutls security update (Moderate)
  • rhsa
    id RHSA-2010:0119
  • rhsa
    id RHSA-2010:0130
  • rhsa
    id RHSA-2010:0155
  • rhsa
    id RHSA-2010:0167
  • rhsa
    id RHSA-2010:0337
  • rhsa
    id RHSA-2010:0338
  • rhsa
    id RHSA-2010:0339
  • rhsa
    id RHSA-2010:0768
  • rhsa
    id RHSA-2010:0770
  • rhsa
    id RHSA-2010:0786
  • rhsa
    id RHSA-2010:0807
  • rhsa
    id RHSA-2010:0865
  • rhsa
    id RHSA-2010:0986
  • rhsa
    id RHSA-2010:0987
  • rhsa
    id RHSA-2011:0880
rpms
  • httpd-0:2.0.46-77.ent
  • httpd-0:2.2.3-31.el5_4.2
  • httpd-debuginfo-0:2.0.46-77.ent
  • httpd-debuginfo-0:2.2.3-31.el5_4.2
  • httpd-devel-0:2.0.46-77.ent
  • httpd-devel-0:2.2.3-31.el5_4.2
  • httpd-manual-0:2.2.3-31.el5_4.2
  • mod_ssl-1:2.0.46-77.ent
  • mod_ssl-1:2.2.3-31.el5_4.2
  • httpd-0:2.0.52-41.ent.6
  • httpd-debuginfo-0:2.0.52-41.ent.6
  • httpd-devel-0:2.0.52-41.ent.6
  • httpd-manual-0:2.0.52-41.ent.6
  • httpd-suexec-0:2.0.52-41.ent.6
  • mod_ssl-1:2.0.52-41.ent.6
  • java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4
  • java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4
  • java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4
  • java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4
  • java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4
  • java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4
  • java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5
  • java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4
  • httpd-0:2.2.10-11.ep5.el5
  • httpd-debuginfo-0:2.2.10-11.ep5.el5
  • httpd-devel-0:2.2.10-11.ep5.el5
  • httpd-manual-0:2.2.10-11.ep5.el5
  • httpd22-0:2.2.10-25.1.ep5.el4
  • httpd22-apr-0:2.2.10-25.1.ep5.el4
  • httpd22-apr-devel-0:2.2.10-25.1.ep5.el4
  • httpd22-apr-util-0:2.2.10-25.1.ep5.el4
  • httpd22-apr-util-devel-0:2.2.10-25.1.ep5.el4
  • httpd22-debuginfo-0:2.2.10-25.1.ep5.el4
  • httpd22-devel-0:2.2.10-25.1.ep5.el4
  • mod_ssl-1:2.2.10-11.ep5.el5
  • mod_ssl22-1:2.2.10-25.1.ep5.el4
  • glassfish-jsf-0:1.2_13-2.ep5.el4
  • glassfish-jsf-0:1.2_13-3.ep5.el5
  • httpd-0:2.2.14-1.2.1.ep5.el5
  • httpd-debuginfo-0:2.2.14-1.2.1.ep5.el5
  • httpd-devel-0:2.2.14-1.2.1.ep5.el5
  • httpd-manual-0:2.2.14-1.2.1.ep5.el5
  • httpd22-0:2.2.14-4.ep5.el4
  • httpd22-apr-0:2.2.14-4.ep5.el4
  • httpd22-apr-devel-0:2.2.14-4.ep5.el4
  • httpd22-apr-util-0:2.2.14-4.ep5.el4
  • httpd22-apr-util-devel-0:2.2.14-4.ep5.el4
  • httpd22-debuginfo-0:2.2.14-4.ep5.el4
  • httpd22-devel-0:2.2.14-4.ep5.el4
  • httpd22-manual-0:2.2.14-4.ep5.el4
  • jakarta-commons-chain-0:1.2-2.1.1.ep5.el5
  • jakarta-commons-chain-0:1.2-2.1.ep5.el4
  • jakarta-commons-digester-0:1.8.1-7.ep5.el4
  • jakarta-commons-io-0:1.4-1.1.ep5.el5
  • jakarta-commons-io-0:1.4-1.ep5.el4
  • jakarta-commons-modeler-0:2.0-3.3.ep5.el4
  • jakarta-commons-validator-0:1.3.1-7.4.ep5.el4
  • jakarta-oro-0:2.0.8-3.1.ep5.el5
  • jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4
  • jboss-javaee-poms-0:5.0.1-2.3.ep5.el4
  • jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4
  • mod_jk-ap20-0:1.2.28-4.1.ep5.el5
  • mod_jk-ap20-0:1.2.28-4.ep5.el4
  • mod_jk-debuginfo-0:1.2.28-4.1.ep5.el5
  • mod_jk-debuginfo-0:1.2.28-4.ep5.el4
  • mod_jk-manual-0:1.2.28-4.1.ep5.el5
  • mod_jk-manual-0:1.2.28-4.ep5.el4
  • mod_ssl-1:2.2.14-1.2.1.ep5.el5
  • mod_ssl22-1:2.2.14-4.ep5.el4
  • struts12-0:1.2.9-2.ep5.el4
  • struts12-0:1.2.9-2.ep5.el5
  • tomcat-native-0:1.1.19-2.0.1.ep5.el5
  • tomcat-native-0:1.1.19-2.0.ep5.el4
  • tomcat-native-debuginfo-0:1.1.19-2.0.1.ep5.el5
  • tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4
  • tomcat5-0:5.5.28-7.1.ep5.el5
  • tomcat5-0:5.5.28-7.ep5.el4
  • tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5
  • tomcat5-admin-webapps-0:5.5.28-7.ep5.el4
  • tomcat5-common-lib-0:5.5.28-7.1.ep5.el5
  • tomcat5-common-lib-0:5.5.28-7.ep5.el4
  • tomcat5-jasper-0:5.5.28-7.1.ep5.el5
  • tomcat5-jasper-0:5.5.28-7.ep5.el4
  • tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5
  • tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4
  • tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5
  • tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4
  • tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5
  • tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4
  • tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5
  • tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4
  • tomcat5-parent-0:5.5.28-7.1.ep5.el5
  • tomcat5-parent-0:5.5.28-7.ep5.el4
  • tomcat5-server-lib-0:5.5.28-7.1.ep5.el5
  • tomcat5-server-lib-0:5.5.28-7.ep5.el4
  • tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5
  • tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4
  • tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5
  • tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4
  • tomcat5-webapps-0:5.5.28-7.1.ep5.el5
  • tomcat5-webapps-0:5.5.28-7.ep5.el4
  • tomcat6-0:6.0.24-2.1.ep5.el5
  • tomcat6-0:6.0.24-2.ep5.el4
  • tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5
  • tomcat6-admin-webapps-0:6.0.24-2.ep5.el4
  • tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5
  • tomcat6-docs-webapp-0:6.0.24-2.ep5.el4
  • tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5
  • tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4
  • tomcat6-javadoc-0:6.0.24-2.1.ep5.el5
  • tomcat6-javadoc-0:6.0.24-2.ep5.el4
  • tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5
  • tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4
  • tomcat6-lib-0:6.0.24-2.1.ep5.el5
  • tomcat6-lib-0:6.0.24-2.ep5.el4
  • tomcat6-log4j-0:6.0.24-2.1.ep5.el5
  • tomcat6-log4j-0:6.0.24-2.ep5.el4
  • tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5
  • tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4
  • tomcat6-webapps-0:6.0.24-2.1.ep5.el5
  • tomcat6-webapps-0:6.0.24-2.ep5.el4
  • xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4
  • xml-commons-resolver12-1:1.2-1.1.ep5.el4
  • java-1.5.0-ibm-1:1.5.0.11.1-1jpp.3.el4
  • java-1.5.0-ibm-1:1.5.0.11.1-1jpp.3.el5
  • java-1.5.0-ibm-accessibility-1:1.5.0.11.1-1jpp.3.el5
  • java-1.5.0-ibm-demo-1:1.5.0.11.1-1jpp.3.el4
  • java-1.5.0-ibm-demo-1:1.5.0.11.1-1jpp.3.el5
  • java-1.5.0-ibm-devel-1:1.5.0.11.1-1jpp.3.el4
  • java-1.5.0-ibm-devel-1:1.5.0.11.1-1jpp.3.el5
  • java-1.5.0-ibm-javacomm-1:1.5.0.11.1-1jpp.3.el4
  • java-1.5.0-ibm-javacomm-1:1.5.0.11.1-1jpp.3.el5
  • java-1.5.0-ibm-jdbc-1:1.5.0.11.1-1jpp.3.el4
  • java-1.5.0-ibm-jdbc-1:1.5.0.11.1-1jpp.3.el5
  • java-1.5.0-ibm-plugin-1:1.5.0.11.1-1jpp.3.el4
  • java-1.5.0-ibm-plugin-1:1.5.0.11.1-1jpp.3.el5
  • java-1.5.0-ibm-src-1:1.5.0.11.1-1jpp.3.el4
  • java-1.5.0-ibm-src-1:1.5.0.11.1-1jpp.3.el5
  • java-1.4.2-ibm-0:1.4.2.13.4-1jpp.1.el3
  • java-1.4.2-ibm-0:1.4.2.13.4-1jpp.1.el4
  • java-1.4.2-ibm-0:1.4.2.13.4-1jpp.1.el5
  • java-1.4.2-ibm-demo-0:1.4.2.13.4-1jpp.1.el3
  • java-1.4.2-ibm-demo-0:1.4.2.13.4-1jpp.1.el4
  • java-1.4.2-ibm-demo-0:1.4.2.13.4-1jpp.1.el5
  • java-1.4.2-ibm-devel-0:1.4.2.13.4-1jpp.1.el3
  • java-1.4.2-ibm-devel-0:1.4.2.13.4-1jpp.1.el4
  • java-1.4.2-ibm-devel-0:1.4.2.13.4-1jpp.1.el5
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.4-1jpp.1.el4
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.4-1jpp.1.el5
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.4-1jpp.1.el3
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.4-1jpp.1.el4
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.4-1jpp.1.el5
  • java-1.4.2-ibm-plugin-0:1.4.2.13.4-1jpp.1.el3
  • java-1.4.2-ibm-plugin-0:1.4.2.13.4-1jpp.1.el4
  • java-1.4.2-ibm-plugin-0:1.4.2.13.4-1jpp.1.el5
  • java-1.4.2-ibm-src-0:1.4.2.13.4-1jpp.1.el3
  • java-1.4.2-ibm-src-0:1.4.2.13.4-1jpp.1.el4
  • java-1.4.2-ibm-src-0:1.4.2.13.4-1jpp.1.el5
  • openssl-0:0.9.8e-12.el5_4.6
  • openssl-debuginfo-0:0.9.8e-12.el5_4.6
  • openssl-devel-0:0.9.8e-12.el5_4.6
  • openssl-perl-0:0.9.8e-12.el5_4.6
  • openssl-0:0.9.7a-33.26
  • openssl-0:0.9.7a-43.17.el4_8.5
  • openssl-debuginfo-0:0.9.7a-33.26
  • openssl-debuginfo-0:0.9.7a-43.17.el4_8.5
  • openssl-devel-0:0.9.7a-33.26
  • openssl-devel-0:0.9.7a-43.17.el4_8.5
  • openssl-perl-0:0.9.7a-33.26
  • openssl-perl-0:0.9.7a-43.17.el4_8.5
  • openssl097a-0:0.9.7a-9.el5_4.2
  • openssl097a-debuginfo-0:0.9.7a-9.el5_4.2
  • nspr-0:4.8.4-1.1.el4_8
  • nspr-0:4.8.4-1.el5_4
  • nspr-debuginfo-0:4.8.4-1.1.el4_8
  • nspr-debuginfo-0:4.8.4-1.el5_4
  • nspr-devel-0:4.8.4-1.1.el4_8
  • nspr-devel-0:4.8.4-1.el5_4
  • nss-0:3.12.6-1.el4_8
  • nss-0:3.12.6-1.el5_4
  • nss-debuginfo-0:3.12.6-1.el4_8
  • nss-debuginfo-0:3.12.6-1.el5_4
  • nss-devel-0:3.12.6-1.el4_8
  • nss-devel-0:3.12.6-1.el5_4
  • nss-pkcs11-devel-0:3.12.6-1.el5_4
  • nss-tools-0:3.12.6-1.el4_8
  • nss-tools-0:3.12.6-1.el5_4
  • gnutls-0:1.4.1-3.el5_4.8
  • gnutls-debuginfo-0:1.4.1-3.el5_4.8
  • gnutls-devel-0:1.4.1-3.el5_4.8
  • gnutls-utils-0:1.4.1-3.el5_4.8
  • gnutls-0:1.0.20-4.el4_8.7
  • gnutls-debuginfo-0:1.0.20-4.el4_8.7
  • gnutls-devel-0:1.0.20-4.el4_8.7
  • java-1.6.0-sun-1:1.6.0.19-1jpp.1.el4
  • java-1.6.0-sun-1:1.6.0.19-1jpp.1.el5
  • java-1.6.0-sun-demo-1:1.6.0.19-1jpp.1.el4
  • java-1.6.0-sun-demo-1:1.6.0.19-1jpp.1.el5
  • java-1.6.0-sun-devel-1:1.6.0.19-1jpp.1.el4
  • java-1.6.0-sun-devel-1:1.6.0.19-1jpp.1.el5
  • java-1.6.0-sun-jdbc-1:1.6.0.19-1jpp.1.el4
  • java-1.6.0-sun-jdbc-1:1.6.0.19-1jpp.1.el5
  • java-1.6.0-sun-plugin-1:1.6.0.19-1jpp.1.el4
  • java-1.6.0-sun-plugin-1:1.6.0.19-1jpp.1.el5
  • java-1.6.0-sun-src-1:1.6.0.19-1jpp.1.el4
  • java-1.6.0-sun-src-1:1.6.0.19-1jpp.1.el5
  • java-1.5.0-sun-uninstall-0:1.5.0.22-1jpp.3.el4
  • java-1.5.0-sun-uninstall-0:1.5.0.22-1jpp.3.el5
  • java-1.6.0-openjdk-1:1.6.0.0-1.11.b16.el5
  • java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.11.b16.el5
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.11.b16.el5
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.11.b16.el5
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.11.b16.el5
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.11.b16.el5
  • java-1.4.2-ibm-0:1.4.2.13.4.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-0:1.4.2.13.4.sap-1jpp.1.el5
  • java-1.4.2-ibm-demo-0:1.4.2.13.4.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-demo-0:1.4.2.13.4.sap-1jpp.1.el5
  • java-1.4.2-ibm-devel-0:1.4.2.13.4.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-devel-0:1.4.2.13.4.sap-1jpp.1.el5
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.4.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.4.sap-1jpp.1.el5
  • java-1.4.2-ibm-src-0:1.4.2.13.4.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-src-0:1.4.2.13.4.sap-1jpp.1.el5
  • rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1
  • rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1
  • java-1.6.0-openjdk-1:1.6.0.0-1.16.b17.el5
  • java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.16.b17.el5
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.16.b17.el5
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.16.b17.el5
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.16.b17.el5
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.16.b17.el5
  • java-1.6.0-sun-1:1.6.0.22-1jpp.1.el4
  • java-1.6.0-sun-1:1.6.0.22-1jpp.1.el5
  • java-1.6.0-sun-demo-1:1.6.0.22-1jpp.1.el4
  • java-1.6.0-sun-demo-1:1.6.0.22-1jpp.1.el5
  • java-1.6.0-sun-devel-1:1.6.0.22-1jpp.1.el4
  • java-1.6.0-sun-devel-1:1.6.0.22-1jpp.1.el5
  • java-1.6.0-sun-jdbc-1:1.6.0.22-1jpp.1.el4
  • java-1.6.0-sun-jdbc-1:1.6.0.22-1jpp.1.el5
  • java-1.6.0-sun-plugin-1:1.6.0.22-1jpp.1.el4
  • java-1.6.0-sun-plugin-1:1.6.0.22-1jpp.1.el5
  • java-1.6.0-sun-src-1:1.6.0.22-1jpp.1.el4
  • java-1.6.0-sun-src-1:1.6.0.22-1jpp.1.el5
  • java-1.4.2-ibm-0:1.4.2.13.6-1jpp.2.el4
  • java-1.4.2-ibm-0:1.4.2.13.6-1jpp.2.el5
  • java-1.4.2-ibm-0:1.4.2.13.6-1jpp.3.el3
  • java-1.4.2-ibm-demo-0:1.4.2.13.6-1jpp.2.el4
  • java-1.4.2-ibm-demo-0:1.4.2.13.6-1jpp.2.el5
  • java-1.4.2-ibm-demo-0:1.4.2.13.6-1jpp.3.el3
  • java-1.4.2-ibm-devel-0:1.4.2.13.6-1jpp.2.el4
  • java-1.4.2-ibm-devel-0:1.4.2.13.6-1jpp.2.el5
  • java-1.4.2-ibm-devel-0:1.4.2.13.6-1jpp.3.el3
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.6-1jpp.2.el4
  • java-1.4.2-ibm-javacomm-0:1.4.2.13.6-1jpp.2.el5
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.6-1jpp.2.el4
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.6-1jpp.2.el5
  • java-1.4.2-ibm-jdbc-0:1.4.2.13.6-1jpp.3.el3
  • java-1.4.2-ibm-plugin-0:1.4.2.13.6-1jpp.2.el4
  • java-1.4.2-ibm-plugin-0:1.4.2.13.6-1jpp.2.el5
  • java-1.4.2-ibm-plugin-0:1.4.2.13.6-1jpp.3.el3
  • java-1.4.2-ibm-src-0:1.4.2.13.6-1jpp.2.el4
  • java-1.4.2-ibm-src-0:1.4.2.13.6-1jpp.2.el5
  • java-1.4.2-ibm-src-0:1.4.2.13.6-1jpp.3.el3
  • java-1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el4
  • java-1.5.0-ibm-1:1.5.0.12.2-1jpp.1.el5
  • java-1.5.0-ibm-accessibility-1:1.5.0.12.2-1jpp.1.el5
  • java-1.5.0-ibm-demo-1:1.5.0.12.2-1jpp.1.el4
  • java-1.5.0-ibm-demo-1:1.5.0.12.2-1jpp.1.el5
  • java-1.5.0-ibm-devel-1:1.5.0.12.2-1jpp.1.el4
  • java-1.5.0-ibm-devel-1:1.5.0.12.2-1jpp.1.el5
  • java-1.5.0-ibm-javacomm-1:1.5.0.12.2-1jpp.1.el4
  • java-1.5.0-ibm-javacomm-1:1.5.0.12.2-1jpp.1.el5
  • java-1.5.0-ibm-jdbc-1:1.5.0.12.2-1jpp.1.el4
  • java-1.5.0-ibm-jdbc-1:1.5.0.12.2-1jpp.1.el5
  • java-1.5.0-ibm-plugin-1:1.5.0.12.2-1jpp.1.el4
  • java-1.5.0-ibm-plugin-1:1.5.0.12.2-1jpp.1.el5
  • java-1.5.0-ibm-src-1:1.5.0.12.2-1jpp.1.el4
  • java-1.5.0-ibm-src-1:1.5.0.12.2-1jpp.1.el5
  • java-1.6.0-openjdk-1:1.6.0.0-1.31.b17.el6_0
  • java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.31.b17.el6_0
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.31.b17.el6_0
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.31.b17.el6_0
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.31.b17.el6_0
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.31.b17.el6_0
  • java-1.4.2-ibm-sap-0:1.4.2.13.6.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-sap-0:1.4.2.13.6.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-demo-0:1.4.2.13.6.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-sap-demo-0:1.4.2.13.6.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-devel-0:1.4.2.13.6.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-sap-devel-0:1.4.2.13.6.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.6.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.6.sap-1jpp.1.el5
  • java-1.4.2-ibm-sap-src-0:1.4.2.13.6.sap-1jpp.1.el4_8
  • java-1.4.2-ibm-sap-src-0:1.4.2.13.6.sap-1jpp.1.el5
  • java-1.6.0-ibm-1:1.6.0.9.0-1jpp.3.el4
  • java-1.6.0-ibm-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el6
  • java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.3.el4
  • java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el6
  • java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.3.el4
  • java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el6
  • java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.3.el4
  • java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el6
  • java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.3.el4
  • java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el6
  • java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.3.el4
  • java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el6
  • java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.3.el4
  • java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.3.el5
  • java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el6
  • java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5
  • java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5
  • aether-api-0:1.13.1-13.el7
  • aether-connector-wagon-0:1.13.1-13.el7
  • aether-impl-0:1.13.1-13.el7
  • aether-spi-0:1.13.1-13.el7
  • aether-util-0:1.13.1-13.el7
  • ant-junit-0:1.9.2-9.el7
  • aopalliance-0:1.0-8.el7
  • apache-commons-codec-eap6-0:1.4-16.redhat_3.1.ep6.el7
  • apache-commons-net-0:3.2-8.el7
  • apache-ivy-0:2.3.0-4.el7
  • apache-mime4j-0:0.6-10.redhat_3.1.ep6.el7
  • apache-parent-0:10-14.el7
  • apache-resource-bundles-0:2-11.el7
  • atinject-0:1-13.20100611svn86.el7
  • bouncycastle-0:1.46-7.el7
  • bsf-0:2.4.0-19.el7
  • c3p0-0:0.9.1.2-3.ep6.el7
  • candlepin-0:0.9.49.3-1.el7
  • candlepin-common-0:1.0.22-1.el7
  • candlepin-guice-0:3.0-2_redhat_1.el7
  • candlepin-scl-0:1-5.el7
  • candlepin-scl-quartz-0:2.1.5-6.el7
  • candlepin-scl-rhino-0:1.7R3-3.el7
  • candlepin-scl-runtime-0:1-5.el7
  • candlepin-selinux-0:0.9.49.3-1.el7
  • candlepin-tomcat-0:0.9.49.3-1.el7
  • capsule-installer-0:2.3.17-1.el7sat
  • cdi-api-0:1.0-11.SP4.el7
  • cglib-0:2.2-18.el7
  • createrepo_c-0:0.7.4-1.el7sat
  • createrepo_c-debuginfo-0:0.7.4-1.el7sat
  • createrepo_c-libs-0:0.7.4-1.el7sat
  • elasticsearch-0:0.90.10-7.el7
  • facter-1:1.7.6-2.1.el7sat
  • facter-debuginfo-1:1.7.6-2.1.el7sat
  • fasterxml-oss-parent-0:11-2.ep6.el7
  • felix-framework-0:4.2.1-5.el7
  • foreman-0:1.7.2.33-1.el7sat
  • foreman-compute-0:1.7.2.33-1.el7sat
  • foreman-debug-0:1.7.2.33-1.el7sat
  • foreman-discovery-image-1:2.1.0-36.el7sat
  • foreman-gce-0:1.7.2.33-1.el7sat
  • foreman-libvirt-0:1.7.2.33-1.el7sat
  • foreman-ovirt-0:1.7.2.33-1.el7sat
  • foreman-postgresql-0:1.7.2.33-1.el7sat
  • foreman-proxy-0:1.7.2.5-1.el7sat
  • foreman-selinux-0:1.7.2.13-1.el7sat
  • foreman-vmware-0:1.7.2.33-1.el7sat
  • gettext-commons-0:0.9.6-7.el7
  • gofer-0:2.6.2-2.el7sat
  • google-guice-0:3.1.3-9.el7
  • gperftools-debuginfo-0:2.0-3.el7sat.2
  • gperftools-libs-0:2.0-3.el7sat.2
  • groovy-0:1.8.9-7.el7
  • guava-0:13.0-6.el7
  • gutterball-0:1.0.15.0-1.el7
  • hawtjni-0:1.6-9.el7
  • hfsplus-tools-0:332.14-12.el7
  • hfsplus-tools-debuginfo-0:332.14-12.el7
  • hibernate-beanvalidation-api-0:1.0.0-4.7.GA_redhat_2.ep6.el7.3
  • hibernate-jpa-2.0-api-0:1.0.1-5.Final_redhat_2.1.ep6.el7.4
  • hibernate3-commons-annotations-0:4.0.1-5.Final_redhat_2.1.ep6.el7.3
  • hibernate4-c3p0-0:4.2.7-6.SP2_redhat_1.1.ep6.el7
  • hibernate4-core-0:4.2.7-6.SP2_redhat_1.1.ep6.el7
  • hibernate4-entitymanager-0:4.2.7-6.SP2_redhat_1.1.ep6.el7
  • hibernate4-validator-0:4.3.1-1.Final_redhat_1.1.ep6.el7.4
  • hiera-0:1.3.1-2.el7
  • hornetq-0:2.3.14-1.Final_redhat_1.1.ep6.el7
  • ipxe-bootimgs-0:20130517-7.1fm.gitc4bce43.el7sat
  • jackson-annotations-0:2.3.0-3.ep6.el7
  • jackson-core-0:2.3.0-1.ep6.el7
  • jackson-databind-0:2.3.0-2.ep6.el7
  • jackson-datatype-hibernate-parent-0:2.3.0-1.ep6.el7
  • jackson-datatype-hibernate4-0:2.3.0-1.ep6.el7
  • jackson-jaxrs-base-0:2.3.0-5.ep6.el7
  • jackson-jaxrs-json-provider-0:2.3.0-5.ep6.el7
  • jackson-jaxrs-providers-0:2.3.0-5.ep6.el7
  • jackson-module-jaxb-annotations-0:2.3.0-2.ep6.el7
  • janino-0:2.6.1-2.el7
  • jansi-0:1.9-7.el7
  • jansi-native-0:1.4-10.el7
  • jboss-ejb-3.1-api-0:1.0.2-10.el7
  • jboss-el-2.2-api-0:1.0.1-0.7.20120212git2fabd8.el7
  • jboss-interceptors-1.1-api-0:1.0.2-0.9.20120319git49a904.el7
  • jboss-jaxb-api_2.2_spec-0:1.0.4-3.Final_redhat_2.1.ep6.el7.1
  • jboss-jaxrpc-1.1-api-0:1.0.1-7.el7
  • jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el7
  • jboss-parent-0:14-2.el7
  • jboss-servlet-3.0-api-0:1.0.1-9.el7
  • jboss-specs-parent-0:1.0.0-0.7.Beta2.el7
  • jboss-transaction-1.1-api-0:1.0.1-8.el7
  • jboss-transaction-api_1.1_spec-0:1.0.1-9.Final_redhat_2.2.ep6.el7
  • jsch-0:0.1.50-5.el7
  • jsoup-0:1.6.1-10.el7
  • jsr-305-0:0-0.18.20090319svn.el7
  • jsr-311-0:1.1.1-6.el7
  • jzlib-0:1.1.1-6.el7
  • katello-0:2.2.0.14-1.el7sat
  • katello-agent-0:2.2.5-1.el7sat
  • katello-certs-tools-0:2.2.1-1.el7sat
  • katello-common-0:2.2.0.14-1.el7sat
  • katello-debug-0:2.2.0.14-1.el7sat
  • katello-installer-0:2.3.17-1.el7sat
  • katello-installer-base-0:2.3.17-1.el7sat
  • katello-service-0:2.2.0.14-1.el7sat
  • katello-utils-0:2.2.5-1.el7sat
  • libdb-cxx-0:5.3.21-17.el7_0.1
  • libdb-debuginfo-0:5.3.21-17.el7_0.1
  • libqpid-dispatch-0:0.4-7.el7
  • liquibase-0:3.1.0-1.el7
  • livecd-tools-1:20.4-1.5.el7sat
  • logback-0:1.0.13-6.el7
  • lucene4-0:4.6.1-1.el7sat
  • lucene4-contrib-0:4.6.1-1.el7sat
  • maven-0:3.0.5-16.el7
  • maven-artifact-0:2.2.1-47.el7
  • maven-artifact-manager-0:2.2.1-47.el7
  • maven-artifact-resolver-1:1.0-10.el7
  • maven-common-artifact-filters-0:1.4-11.el7
  • maven-compiler-plugin-0:3.1-4.el7
  • maven-file-management-1:1.2.1-8.el7
  • maven-filtering-0:1.1-3.el7
  • maven-invoker-0:2.1.1-9.el7
  • maven-model-0:2.2.1-47.el7
  • maven-monitor-0:2.2.1-47.el7
  • maven-parent-0:20-5.el7
  • maven-plugin-registry-0:2.2.1-47.el7
  • maven-profile-0:2.2.1-47.el7
  • maven-project-0:2.2.1-47.el7
  • maven-release-0:2.2.1-12.el7
  • maven-release-manager-0:2.2.1-12.el7
  • maven-release-plugin-0:2.2.1-12.el7
  • maven-remote-resources-plugin-0:1.4-7.el7
  • maven-scm-0:1.8.1-2.el7
  • maven-settings-0:2.2.1-47.el7
  • maven-shared-incremental-0:1.1-6.el7
  • maven-shared-io-1:1.1-7.el7
  • maven-shared-utils-0:0.4-3.el7
  • maven-toolchain-0:2.2.1-47.el7
  • maven-wagon-0:2.4-3.el7
  • mod_passenger-0:4.0.18-19.el7sat
  • modello-0:1.7-4.el7
  • mongodb-0:2.4.9-3.el7sat
  • mongodb-debuginfo-0:2.4.9-3.el7sat
  • mongodb-server-0:2.4.9-3.el7sat
  • nekohtml-0:1.9.14-13.el7
  • netty-0:3.6.7-1.Final_redhat_1.1.ep6.el7
  • oauth-0:20100601-5.el7
  • objectweb-asm-0:3.3.1-9.el7
  • openscap-0:1.2.4-1.el7sat
  • openscap-debuginfo-0:1.2.4-1.el7sat
  • openscap-python-0:1.2.4-1.el7sat
  • openscap-scanner-0:1.2.4-1.el7sat
  • openscap-utils-0:1.2.4-1.el7sat
  • plexus-build-api-0:0.0.7-11.el7
  • plexus-cipher-0:1.7-5.el7
  • plexus-classworlds-0:2.4.2-8.el7
  • plexus-compiler-0:2.2-7.el7
  • plexus-component-api-0:1.0-0.16.alpha15.el7
  • plexus-containers-component-annotations-0:1.5.5-14.el7
  • plexus-containers-container-default-0:1.5.5-14.el7
  • plexus-interactivity-0:1.0-0.14.alpha6.el7
  • plexus-interpolation-0:1.15-8.el7
  • plexus-resources-0:1.0-0.15.a7.el7
  • plexus-sec-dispatcher-0:1.4-13.el7
  • plexus-utils-0:3.0.9-9.el7
  • plexus-velocity-0:1.1.8-16.el7
  • pulp-admin-client-0:2.6.0.15-1.el7sat
  • pulp-docker-plugins-0:0.2.5-1.el7sat
  • pulp-katello-0:0.5-1.el7sat
  • pulp-nodes-child-0:2.6.0.15-1.el7sat
  • pulp-nodes-common-0:2.6.0.15-1.el7sat
  • pulp-nodes-parent-0:2.6.0.15-1.el7sat
  • pulp-puppet-admin-extensions-0:2.6.0.15-1.el7sat
  • pulp-puppet-plugins-0:2.6.0.15-1.el7sat
  • pulp-puppet-tools-0:2.6.0.15-1.el7sat
  • pulp-rpm-admin-extensions-0:2.6.0.15-1.el7sat
  • pulp-rpm-handlers-0:2.6.0.15-1.el7sat
  • pulp-rpm-plugins-0:2.6.0.15-1.el7sat
  • pulp-selinux-0:2.6.0.15-1.el7sat
  • pulp-server-0:2.6.0.15-1.el7sat
  • puppet-0:3.6.2-4.el7sat
  • puppet-foreman_scap_client-0:0.3.3-9.el7sat
  • puppet-server-0:3.6.2-4.el7sat
  • puppetlabs-stdlib-0:4.2.1-1.20140510git08b00d9.el7sat
  • python-BeautifulSoup-1:3.0.8.1-1.el7sat
  • python-amqp-0:1.4.6-1.el7sat
  • python-anyjson-0:0.3.3-5.el7sat
  • python-billiard-1:3.3.0.17-1.el7sat
  • python-billiard-debuginfo-1:3.3.0.17-1.el7sat
  • python-blinker-0:1.3-2.el7sat
  • python-bson-0:2.5.2-3.el7sat
  • python-celery-0:3.1.11-1.el7sat
  • python-cherrypy-0:3.2.2-3.el7sat
  • python-crane-0:0.2.2-1.el7
  • python-flask-1:0.10.1-4.el7sat
  • python-gofer-0:2.6.2-2.el7sat
  • python-gofer-proton-0:2.6.2-2.el7sat
  • python-gofer-qpid-0:2.6.2-2.el7sat
  • python-httplib2-0:0.6.0-6.el7sat
  • python-imgcreate-1:20.4-1.5.el7sat
  • python-isodate-0:0.5.0-4.pulp.el7sat
  • python-itsdangerous-0:0.23-1.el7sat
  • python-jinja2-0:2.7.2-2.el7sat
  • python-kombu-1:3.0.24-10.pulp.el7sat
  • python-mongoengine-0:0.7.10-2.el7sat
  • python-nectar-0:1.3.1-2.el7sat
  • python-oauth2-0:1.5.211-8.el7sat
  • python-okaara-0:1.0.32-1.el7sat
  • python-pulp-agent-lib-0:2.6.0.15-1.el7sat
  • python-pulp-bindings-0:2.6.0.15-1.el7sat
  • python-pulp-client-lib-0:2.6.0.15-1.el7sat
  • python-pulp-common-0:2.6.0.15-1.el7sat
  • python-pulp-docker-common-0:0.2.5-1.el7sat
  • python-pulp-puppet-common-0:2.6.0.15-1.el7sat
  • python-pulp-rpm-common-0:2.6.0.15-1.el7sat
  • python-pymongo-0:2.5.2-3.el7sat
  • python-pymongo-debuginfo-0:2.5.2-3.el7sat
  • python-pymongo-gridfs-0:2.5.2-3.el7sat
  • python-qpid-0:0.30-6.el7
  • python-qpid-proton-0:0.9-4.el7
  • python-qpid-qmf-0:0.30-5.el7
  • python-requests-0:2.4.3-1.el7sat
  • python-saslwrapper-0:0.22-5.el7sat
  • python-semantic-version-0:2.2.0-3.el7sat
  • python-simplejson-0:3.2.0-1.el7sat
  • python-simplejson-debuginfo-0:3.2.0-1.el7sat
  • python-webpy-0:0.37-3.el7sat
  • python-werkzeug-0:0.9.1-1.el7sat
  • qpid-cpp-client-0:0.30-9.el7
  • qpid-cpp-client-devel-0:0.30-9.el7
  • qpid-cpp-debuginfo-0:0.30-9.el7
  • qpid-cpp-server-0:0.30-9.el7
  • qpid-cpp-server-devel-0:0.30-9.el7
  • qpid-cpp-server-linearstore-0:0.30-9.el7
  • qpid-dispatch-debuginfo-0:0.4-7.el7
  • qpid-dispatch-router-0:0.4-7.el7
  • qpid-dispatch-tools-0:0.4-7.el7
  • qpid-java-client-0:0.30-3.el7
  • qpid-java-common-0:0.30-3.el7
  • qpid-proton-c-0:0.9-4.el7
  • qpid-proton-debuginfo-0:0.9-4.el7
  • qpid-qmf-0:0.30-5.el7
  • qpid-qmf-debuginfo-0:0.30-5.el7
  • qpid-tools-0:0.30-4.el7
  • resteasy-0:2.3.8-4.Final_redhat_3.1.ep6.el7
  • ruby-augeas-0:0.5.0-1.el7
  • ruby-augeas-debuginfo-0:0.5.0-1.el7
  • ruby-rgen-0:0.6.5-2.el7sat
  • ruby-shadow-0:1.4.1-21.el7
  • ruby-shadow-debuginfo-0:1.4.1-21.el7
  • ruby193-facter-0:1.6.18-5.el7sat
  • ruby193-ruby-wrapper-0:0.0.2-6.el7sat
  • ruby193-rubygem-addressable-0:2.3.5-2.el7sat
  • ruby193-rubygem-algebrick-0:0.4.0-3.el7sat
  • ruby193-rubygem-ancestry-0:2.0.0-1.el7sat
  • ruby193-rubygem-anemone-0:0.7.2-11.el7sat
  • ruby193-rubygem-angular-rails-templates-0:0.1.2-1.el7sat
  • ruby193-rubygem-ansi-0:1.4.3-3.el7sat
  • ruby193-rubygem-apipie-params-0:0.0.3-2.el7sat
  • ruby193-rubygem-apipie-rails-0:0.2.5-1.el7sat
  • ruby193-rubygem-archive-tar-minitar-0:0.5.2-9.el7
  • ruby193-rubygem-audited-0:3.0.0-5.el7sat
  • ruby193-rubygem-audited-activerecord-0:3.0.0-8.el7sat
  • ruby193-rubygem-autoparse-0:0.3.3-2.el7sat
  • ruby193-rubygem-bastion-0:0.3.0.10-1.el7sat
  • ruby193-rubygem-bundler_ext-0:0.3.0-6.el7sat
  • ruby193-rubygem-commonjs-0:0.2.7-1.el7
  • ruby193-rubygem-daemons-0:1.1.4-10.el7sat
  • ruby193-rubygem-deep_cloneable-0:2.0.0-4.el7
  • ruby193-rubygem-deface-0:0.7.2-7.el7sat
  • ruby193-rubygem-docker-api-0:1.17.0-1.1.el7sat
  • ruby193-rubygem-dynflow-0:0.7.7.9-1.el7sat
  • ruby193-rubygem-excon-0:0.38.0-1.el7
  • ruby193-rubygem-extlib-0:0.9.16-2.el7sat
  • ruby193-rubygem-faraday-0:0.8.8-2.el7sat
  • ruby193-rubygem-fast_gettext-0:0.8.0-13.el7sat
  • ruby193-rubygem-ffi-0:1.9.3-3.el7sat
  • ruby193-rubygem-ffi-debuginfo-0:1.9.3-3.el7sat
  • ruby193-rubygem-fog-0:1.24.0-3.el7sat
  • ruby193-rubygem-fog-brightbox-0:0.0.1-2.el7sat
  • ruby193-rubygem-fog-core-0:1.24.0-1.el7
  • ruby193-rubygem-fog-json-0:1.0.0-2.1.el7
  • ruby193-rubygem-fog-radosgw-0:0.0.3-1.el7
  • ruby193-rubygem-fog-sakuracloud-0:0.1.1-1.el7
  • ruby193-rubygem-fog-softlayer-0:0.3.9-1.el7
  • ruby193-rubygem-fog-xml-0:0.1.0-1.el7
  • ruby193-rubygem-foreigner-0:1.4.2-1.el7sat
  • ruby193-rubygem-foreman-redhat_access-0:0.2.1-1.el7sat
  • ruby193-rubygem-foreman-tasks-0:0.6.15.4-1.el7sat
  • ruby193-rubygem-foreman_abrt-0:0.0.5-2.el7sat
  • ruby193-rubygem-foreman_bootdisk-0:4.0.2.13-1.el7sat
  • ruby193-rubygem-foreman_discovery-0:2.0.0.19-1.el7sat
  • ruby193-rubygem-foreman_docker-0:1.2.0.18-1.el7sat
  • ruby193-rubygem-foreman_gutterball-0:0.0.1.9-1.el7sat
  • ruby193-rubygem-foreman_hooks-0:0.3.7-2.el7sat
  • ruby193-rubygem-foreman_openscap-0:0.3.2.10-1.el7sat
  • ruby193-rubygem-formatador-0:0.2.1-9.el7sat
  • ruby193-rubygem-friendly_id-0:4.0.10.1-1.el7
  • ruby193-rubygem-gettext_i18n_rails-0:0.10.0-3.el7sat
  • ruby193-rubygem-gettext_i18n_rails_js-0:0.0.8-3.el7sat
  • ruby193-rubygem-google-api-client-0:0.6.4-2.el7sat
  • ruby193-rubygem-haml-0:3.1.6-6.el7sat
  • ruby193-rubygem-haml-rails-0:0.3.4-8.el7sat
  • ruby193-rubygem-hashr-0:0.0.22-5.el7sat
  • ruby193-rubygem-hooks-0:0.2.2-7.el7sat
  • ruby193-rubygem-hpricot-0:0.8.6-11.el7sat
  • ruby193-rubygem-hpricot-debuginfo-0:0.8.6-11.el7sat
  • ruby193-rubygem-i18n_data-0:0.2.7-5.el7sat
  • ruby193-rubygem-ipaddress-0:0.8.0-6.el7
  • ruby193-rubygem-jquery-ui-rails-0:4.0.2-8.el7sat
  • ruby193-rubygem-justified-0:0.0.4-4.el7sat
  • ruby193-rubygem-jwt-0:0.1.8-2.el7sat
  • ruby193-rubygem-katello-0:2.2.0.65-1.el7sat
  • ruby193-rubygem-launchy-0:2.3.0-2.el7sat
  • ruby193-rubygem-ldap_fluff-0:0.3.2-1.el7
  • ruby193-rubygem-less-0:2.5.1-2.1.el7
  • ruby193-rubygem-less-rails-0:2.5.0-1.el7
  • ruby193-rubygem-little-plugger-0:1.1.3-17.el7sat
  • ruby193-rubygem-logging-0:1.8.1-26.el7sat
  • ruby193-rubygem-multi_json-0:1.8.2-4.el7sat
  • ruby193-rubygem-multi_json-doc-0:1.8.2-4.el7sat
  • ruby193-rubygem-multipart-post-0:1.2.0-3.el7sat
  • ruby193-rubygem-net-ldap-0:0.3.1-3.el7sat
  • ruby193-rubygem-net-scp-0:1.1.0-5.el7sat
  • ruby193-rubygem-net-ssh-0:2.6.7-5.el7sat
  • ruby193-rubygem-nokogiri-0:1.5.11-1.el7sat
  • ruby193-rubygem-nokogiri-debuginfo-0:1.5.11-1.el7sat
  • ruby193-rubygem-oauth-0:0.4.7-8.el7sat
  • ruby193-rubygem-openscap-0:0.4.2-2.el7sat
  • ruby193-rubygem-ovirt_provision_plugin-0:1.0.1.2-1.el7sat
  • ruby193-rubygem-passenger-0:4.0.18-19.el7sat
  • ruby193-rubygem-passenger-native-0:4.0.18-19.el7sat
  • ruby193-rubygem-passenger-native-libs-0:4.0.18-19.el7sat
  • ruby193-rubygem-pg-0:0.12.2-10.el7sat
  • ruby193-rubygem-pg-debuginfo-0:0.12.2-10.el7sat
  • ruby193-rubygem-po_to_json-0:0.0.7-3.el7sat
  • ruby193-rubygem-qpid_messaging-0:0.30.0-1.el7sat
  • ruby193-rubygem-qpid_messaging-debuginfo-0:0.30.0-1.el7sat
  • ruby193-rubygem-rabl-0:0.9.0-1.el7sat
  • ruby193-rubygem-rbovirt-0:0.0.29-1.el7sat
  • ruby193-rubygem-rbvmomi-0:1.6.0-3.el7sat
  • ruby193-rubygem-redhat_access_lib-0:0.0.4-1.el7sat
  • ruby193-rubygem-rest-client-0:1.6.7-1.el7sat
  • ruby193-rubygem-robotex-0:1.0.0-16.el7sat
  • ruby193-rubygem-ruby-libvirt-0:0.5.1-1.el7sat
  • ruby193-rubygem-ruby-libvirt-debuginfo-0:0.5.1-1.el7sat
  • ruby193-rubygem-ruby2ruby-0:2.0.1-9.el7sat
  • ruby193-rubygem-ruby_parser-0:3.1.1-15.el7sat
  • ruby193-rubygem-runcible-0:1.3.5-1.el7sat
  • ruby193-rubygem-safemode-0:1.2.1-1.el7sat
  • ruby193-rubygem-sass-0:3.2.13-1.el7sat
  • ruby193-rubygem-sass-doc-0:3.2.13-1.el7sat
  • ruby193-rubygem-scaptimony-0:0.3.0.1-1.el7sat
  • ruby193-rubygem-scoped_search-0:2.7.1-2.el7sat
  • ruby193-rubygem-secure_headers-0:1.3.3-1.el7
  • ruby193-rubygem-sequel-0:3.45.0-6.el7sat
  • ruby193-rubygem-sexp_processor-0:4.1.3-7.el7sat
  • ruby193-rubygem-signet-0:0.4.5-2.el7sat
  • ruby193-rubygem-sprockets-0:2.10.1-3.el7sat
  • ruby193-rubygem-sprockets-doc-0:2.10.1-3.el7sat
  • ruby193-rubygem-sshkey-0:1.6.0-3.el7sat
  • ruby193-rubygem-strong_parameters-0:0.2.1-11.el7sat
  • ruby193-rubygem-tire-0:0.6.2-1.el7sat
  • ruby193-rubygem-trollop-0:2.0-5.el7sat
  • ruby193-rubygem-unf-0:0.1.3-4.el7sat
  • ruby193-rubygem-unf-debuginfo-0:0.1.3-4.el7sat
  • ruby193-rubygem-unf_ext-0:0.0.6-5.el7sat
  • ruby193-rubygem-unf_ext-debuginfo-0:0.0.6-5.el7sat
  • ruby193-rubygem-uuidtools-0:2.1.3-6.el7sat
  • ruby193-rubygem-validates_lengths_from_database-0:0.2.0-1.3.el7sat
  • ruby193-rubygem-wicked-0:1.1.0-1.el7
  • ruby193-rubygem-will_paginate-0:3.0.2-10.el7sat
  • rubygem-ansi-0:1.4.3-3.el7sat
  • rubygem-apipie-bindings-0:0.0.11-1.el7
  • rubygem-awesome_print-0:1.0.2-12.el7sat
  • rubygem-bundler_ext-0:0.3.0-7.el7sat
  • rubygem-clamp-0:0.6.2-2.el7sat
  • rubygem-fast_gettext-0:0.8.0-13.el7sat
  • rubygem-fastercsv-0:1.5.4-10.el7sat
  • rubygem-ffi-0:1.4.0-3.el7sat
  • rubygem-ffi-debuginfo-0:1.4.0-3.el7sat
  • rubygem-foreman_scap_client-0:0.1.0.4-1.el7sat
  • rubygem-gssapi-0:1.1.2-4.el7sat
  • rubygem-hammer_cli-0:0.1.4.11-1.el7sat
  • rubygem-hammer_cli_csv-0:0.0.6.5-1.el7sat
  • rubygem-hammer_cli_foreman-0:0.1.4.14-1.el7sat
  • rubygem-hammer_cli_foreman_bootdisk-0:0.1.2.7-1.el7sat
  • rubygem-hammer_cli_foreman_discovery-0:0.0.1.10-1.el7sat
  • rubygem-hammer_cli_foreman_docker-0:0.0.3.9-1.el7sat
  • rubygem-hammer_cli_foreman_docker-doc-0:0.0.3.9-1.el7sat
  • rubygem-hammer_cli_foreman_tasks-0:0.0.3.5-1.el7sat
  • rubygem-hammer_cli_gutterball-0:0.0.1.3-1.el7sat
  • rubygem-hammer_cli_import-0:0.10.19-1.el7sat
  • rubygem-hammer_cli_katello-0:0.0.7.17-1.el7sat
  • rubygem-hashie-0:2.0.5-2.el7sat
  • rubygem-highline-0:1.6.21-1.el7sat
  • rubygem-kafo-0:0.6.5.9-1.el7sat
  • rubygem-kafo_parsers-0:0.0.4.4-1.el7sat
  • rubygem-little-plugger-0:1.1.3-17.el7sat
  • rubygem-locale-0:2.0.9-7.el7sat
  • rubygem-logging-0:1.8.1-26.el7sat
  • rubygem-mime-types-0:1.19-7.el7sat
  • rubygem-multi_json-0:1.8.2-4.el7sat
  • rubygem-multi_json-doc-0:1.8.2-4.el7sat
  • rubygem-oauth-0:0.4.7-8.el7sat
  • rubygem-passenger-0:4.0.18-19.el7sat
  • rubygem-passenger-debuginfo-0:4.0.18-19.el7sat
  • rubygem-passenger-native-0:4.0.18-19.el7sat
  • rubygem-passenger-native-libs-0:4.0.18-19.el7sat
  • rubygem-powerbar-0:1.0.11-8.el7sat
  • rubygem-rack-1:1.4.1-13.el7sat
  • rubygem-rack-protection-0:1.5.0-7.el7sat
  • rubygem-rake-0:0.9.2.2-41.el7sat
  • rubygem-rb-readline-0:0.5.1-1.el7
  • rubygem-rest-client-0:1.6.7-1.el7sat
  • rubygem-rkerberos-0:0.1.2-3.el7sat
  • rubygem-rkerberos-debuginfo-0:0.1.2-3.el7sat
  • rubygem-rubyipmi-0:0.10.0-1.el7sat
  • rubygem-satyr-0:0.2-1.el7
  • rubygem-sinatra-1:1.3.6-27.el7sat
  • rubygem-smart_proxy_abrt-0:0.0.6-5.el7sat
  • rubygem-smart_proxy_discovery-0:1.0.2.1-1.el7sat
  • rubygem-smart_proxy_openscap-0:0.3.0.9-1.el7sat
  • rubygem-smart_proxy_pulp-0:1.0.1.2-1.el7sat
  • rubygem-table_print-0:1.5.1-3.el7sat
  • rubygem-tilt-0:1.3.3-18.el7sat
  • saslwrapper-0:0.22-5.el7sat
  • saslwrapper-debuginfo-0:0.22-5.el7sat
  • sigar-0:1.6.5-0.9.git58097d9.el7sat
  • sigar-debuginfo-0:1.6.5-0.9.git58097d9.el7sat
  • sigar-java-0:1.6.5-0.9.git58097d9.el7sat
  • sisu-inject-bean-0:2.3.0-11.el7
  • sisu-inject-plexus-0:2.3.0-11.el7
  • snappy-java-0:1.0.4-2.el7sat
  • snappy-java-debuginfo-0:1.0.4-2.el7sat
  • v8-1:3.14.5.10-11.el7sat
  • v8-debuginfo-1:3.14.5.10-11.el7sat
  • xbean-0:3.13-6.el7
  • xpp3-minimal-0:1.1.3.8-11.el7
  • xstream-0:1.3.1-10.el7
refmap via4
aixapar
  • IC67848
  • IC68054
  • IC68055
  • PM00675
  • PM12247
apple
  • APPLE-SA-2010-01-19-1
  • APPLE-SA-2010-05-18-1
  • APPLE-SA-2010-05-18-2
bid 36935
bugtraq
  • 20091118 TLS / SSLv3 vulnerability explained (DRAFT)
  • 20091124 rPSA-2009-0155-1 httpd mod_ssl
  • 20091130 TLS / SSLv3 vulnerability explained (New ways to leverage the vulnerability)
  • 20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console
  • 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
  • 20131121 ESA-2013-077: RSA Data Protection Manager Appliance Multiple Vulnerabilities
cert
  • TA10-222A
  • TA10-287A
cert-vn VU#120541
cisco 20091109 Transport Layer Security Renegotiation Vulnerability
confirm
debian
  • DSA-1934
  • DSA-2141
  • DSA-3253
fedora
  • FEDORA-2009-12229
  • FEDORA-2009-12305
  • FEDORA-2009-12604
  • FEDORA-2009-12606
  • FEDORA-2009-12750
  • FEDORA-2009-12775
  • FEDORA-2009-12782
  • FEDORA-2009-12968
  • FEDORA-2010-16240
  • FEDORA-2010-16294
  • FEDORA-2010-16312
  • FEDORA-2010-5357
  • FEDORA-2010-5942
  • FEDORA-2010-6131
fulldisc 20091111 Re: SSL/TLS MiTM PoC
gentoo
  • GLSA-200912-01
  • GLSA-201203-22
  • GLSA-201406-32
hp
  • HPSBGN02562
  • HPSBHF02706
  • HPSBHF03293
  • HPSBMA02534
  • HPSBMA02547
  • HPSBMA02568
  • HPSBMU02759
  • HPSBMU02799
  • HPSBOV02683
  • HPSBOV02762
  • HPSBUX02482
  • HPSBUX02498
  • HPSBUX02517
  • HPSBUX02524
  • SSRT090180
  • SSRT090208
  • SSRT090249
  • SSRT090264
  • SSRT100058
  • SSRT100089
  • SSRT100179
  • SSRT100219
  • SSRT100613
  • SSRT100817
  • SSRT100825
  • SSRT101846
mandriva
  • MDVSA-2010:076
  • MDVSA-2010:084
  • MDVSA-2010:089
misc
mlist
  • [announce] 20091107 CVE-2009-3555 - apache/mod_ssl vulnerability and mitigation
  • [cryptography] 20091105 OpenSSL 0.9.8l released
  • [gnutls-devel] 20091105 Re: TLS renegotiation MITM
  • [oss-security] 20091105 CVE-2009-3555 for TLS renegotiation MITM attacks
  • [oss-security] 20091105 Re: CVE-2009-3555 for TLS renegotiation MITM attacks
  • [oss-security] 20091107 Re: CVE-2009-3555 for TLS renegotiation MITM attacks
  • [oss-security] 20091107 Re: [TLS] CVE-2009-3555 for TLS renegotiation MITM attacks
  • [oss-security] 20091120 CVEs for nginx
  • [oss-security] 20091123 Re: CVEs for nginx
  • [tls] 20091104 MITM attack on delayed TLS-client auth through renegotiation
  • [tls] 20091104 TLS renegotiation issue
  • [tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
  • [tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
  • [tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/
  • [tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/
openbsd
  • [4.5] 010: SECURITY FIX: November 26, 2009
  • [4.6] 004: SECURITY FIX: November 26, 2009
osvdb
  • 60521
  • 60972
  • 62210
  • 65202
sectrack
  • 1023148
  • 1023163
  • 1023204
  • 1023205
  • 1023206
  • 1023207
  • 1023208
  • 1023209
  • 1023210
  • 1023211
  • 1023212
  • 1023213
  • 1023214
  • 1023215
  • 1023216
  • 1023217
  • 1023218
  • 1023219
  • 1023224
  • 1023243
  • 1023270
  • 1023271
  • 1023272
  • 1023273
  • 1023274
  • 1023275
  • 1023411
  • 1023426
  • 1023427
  • 1023428
  • 1024789
secunia
  • 37291
  • 37292
  • 37320
  • 37383
  • 37399
  • 37453
  • 37501
  • 37504
  • 37604
  • 37640
  • 37656
  • 37675
  • 37859
  • 38003
  • 38020
  • 38056
  • 38241
  • 38484
  • 38687
  • 38781
  • 39127
  • 39136
  • 39242
  • 39243
  • 39278
  • 39292
  • 39317
  • 39461
  • 39500
  • 39628
  • 39632
  • 39713
  • 39819
  • 40070
  • 40545
  • 40747
  • 40866
  • 41480
  • 41490
  • 41818
  • 41967
  • 41972
  • 42377
  • 42379
  • 42467
  • 42724
  • 42733
  • 42808
  • 42811
  • 42816
  • 43308
  • 44183
  • 44954
  • 48577
slackware SSA:2009-320-01
sunalert
  • 1021653
  • 1021752
  • 273029
  • 273350
  • 274990
suse
  • SUSE-SA:2009:057
  • SUSE-SA:2010:061
  • SUSE-SR:2010:008
  • SUSE-SR:2010:011
  • SUSE-SR:2010:012
  • SUSE-SR:2010:013
  • SUSE-SR:2010:019
  • SUSE-SR:2010:024
  • SUSE-SU-2011:0847
  • openSUSE-SU-2011:0845
ubuntu
  • USN-1010-1
  • USN-923-1
  • USN-927-1
  • USN-927-4
  • USN-927-5
vupen
  • ADV-2009-3164
  • ADV-2009-3165
  • ADV-2009-3205
  • ADV-2009-3220
  • ADV-2009-3310
  • ADV-2009-3313
  • ADV-2009-3353
  • ADV-2009-3354
  • ADV-2009-3484
  • ADV-2009-3521
  • ADV-2009-3587
  • ADV-2010-0086
  • ADV-2010-0173
  • ADV-2010-0748
  • ADV-2010-0848
  • ADV-2010-0916
  • ADV-2010-0933
  • ADV-2010-0982
  • ADV-2010-0994
  • ADV-2010-1054
  • ADV-2010-1107
  • ADV-2010-1191
  • ADV-2010-1350
  • ADV-2010-1639
  • ADV-2010-1673
  • ADV-2010-1793
  • ADV-2010-2010
  • ADV-2010-2745
  • ADV-2010-3069
  • ADV-2010-3086
  • ADV-2010-3126
  • ADV-2011-0032
  • ADV-2011-0033
  • ADV-2011-0086
xf tls-renegotiation-weak-security(54158)
statements via4
contributor Tomas Hoger
lastmodified 2009-11-20
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3555 Additional information can be found in the Red Hat Knowledgebase article: http://kbase.redhat.com/faq/docs/DOC-20491
Last major update 13-02-2023 - 02:20
Published 09-11-2009 - 17:30
Last modified 13-02-2023 - 02:20
Back to Top